Fuzzy Error-Tolerance Biometric Identity-Based Signature in the Standard Model

Article Preview

Abstract:

Biometric measurements are noisy and the existing techniques cannot be used directly to construct biometric-based scheme. Hence an error-tolerance property(Fuzzy) can be used to solve this problem. In this paper, a new biometric identity based signature scheme is proposed with the error-tolerance property. Our scheme is constructed in the standard model and achieves the selective identity security. In addition, the security of our scheme is reduced to a natural assumption-Computation Diffie-Hellman(CDH) assumption instead of other strong assumptions.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

474-477

Citation:

Online since:

December 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Shamir A. Identity-based Cryptosystems and Signature Schemes. Advances in Cryptology-CRYPTO, Edited by G. R. Blakley, David Chaum, Berlin, Springer press, LNCS, vol. 196, pp.47-53(1984).

DOI: 10.1007/3-540-39568-7_5

Google Scholar

[2] Li C T, Hwang M. S. An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and computer applications, 33(1), pp.1-5( 2010).

DOI: 10.1016/j.jnca.2009.08.001

Google Scholar

[3] Sahai A., Waters B. Fuzzy Identity-Based Encryption. Advances in Cryptology- EUROCRYPT, Berlin, Springer press , LNCS, vol. 3494, pp.457-473(2005).

DOI: 10.1007/11426639_27

Google Scholar

[4] V. Goyal, O. Pandey, A. Sahai, B. Waters, Attribute-based encryption for fine-grained accesscontrol of encrypted data, Proc. of CCS, New York, ACM Press, pp.221-238(2006).

DOI: 10.1145/1180405.1180418

Google Scholar

[5] M. Pirretti, P. Traynor, P. McDaniel, B. Waters, Secure Attribute-Based Systems, Proc. of ACMCCS'06, ACM, pp.99-112(2006).

DOI: 10.1145/1180405.1180419

Google Scholar

[6] J. Baek, W. Susilo, J. Zhou, New constructions of fuzzy identity-based encryption, Proc. of the 2nd ACM Symposium on Information, Computer and Communications Security, New York, ACM press, NY, pp.368-370(2007).

DOI: 10.1145/1229285.1229330

Google Scholar

[7] M. Chase, Multi-authority attribute based encryption, Proc. of TCC, Berlin, Springer press, LNCS, vol. 4392, pp.515-534(2007).

Google Scholar

[8] D. Boneh, X. Boyen, and S. Halevi. Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles. In proceedings of RSA-CT '06, LNCS, vol. 3860, pp.226-243(2006 ).

DOI: 10.1007/11605805_15

Google Scholar

[9] B. Waters, Efficient identity based encryption without random oracles, Proc. of EUROCRYP, Berlin, Springer press, LNCS, vol. 3494, pp.114-127(2005).

Google Scholar

[10] P.Y. Yang et al., Fuzzy Identity Based Signature, Preprint submitted to Elsevier Preprint, 2008/002.

Google Scholar

[11] C. Wang, J. Kim, Two Constructions of Fuzzy Identity Based Signature. International Conference on Biomedical Engineering and Informatics, IEEE press, pp.1-5(2009).

DOI: 10.1109/bmei.2009.5305820

Google Scholar

[12] C. Wang, W. Chen, Y. Liu . A Fuzzy Identity Based Signature Scheme. International Conference on E-Business and Information System Security, IEEE press, pp.1-5(2009).

DOI: 10.1109/ebiss.2009.5137871

Google Scholar

[13] L. Fan, J. Zheng and J. Yang. A Biometric Identity-based Signature Scheme in the Standard model. IEEE International Conference on Network Infrastructure and Digital Content, IEEE press, p.552 – 556 (2009).

DOI: 10.1109/icnidc.2009.5360996

Google Scholar

[14] Kenneth G. Paterson and Jacob C.N. Schuldt: Efficient Identity-Based Signatures Secure in the Standard Model. Proc. ACISP, L. Batten and R. Safavi-Naini Eds., Berlin, Springer press, LNCS, vol. 4058, pp.207-222(2006).

Google Scholar