Fuzzy Biometric Identity-Based Signature in the Standard Model

Article Preview

Abstract:

Using a biometric as an identity has the advantage that identities are unique if the underlying biometric is of a good quality, such as fingerprints, faces, irises, etc. However, biometric measurements are noisy and the existing identity-based systems cannot be used directly to construct this scheme. The error-tolerance property(Fuzzy) can be used to solve this problem. Based on the error-tolerance property, a new biometric identity based signature scheme is proposed. Our scheme is constructed in the standard model and achieves a strong security-full security. In addition, the security of our scheme is reduced to a generalized assumption-Computation Diffie-Hellman(CDH) assumption instead of other strong assumptions.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3350-3354

Citation:

Online since:

December 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Shamir A. Identity-based Cryptosystems and Signature Schemes. G. R. Blakley, David Chaum (Eds. ): Advances in Cryptology-CRYPTO, Springer-Verlag, 1984, vol. 196 of LNCS, pp.47-53.

DOI: 10.1007/3-540-39568-7_5

Google Scholar

[2] Li C T, Hwang M. S. An efficient biometrics-based remote user authentication scheme using smart cards. Journal of Network and computer applications, 2010, 33(1): 1-5.

DOI: 10.1016/j.jnca.2009.08.001

Google Scholar

[3] Sahai A., Waters B. Fuzzy Identity-Based Encryption. Ronald Cramer(Eds. ): Advances in Cryptology- EUROCRYPT, Springer-Verlag, 2005, vol. 3494 of LNCS, pp.457-473.

DOI: 10.1007/11426639_27

Google Scholar

[4] V. Goyal, O. Pandey, A. Sahai, B. Waters, Attribute-based encryption for fine-grained accesscontrol of encrypted data, Proc. of CCS, 89-98, New York, ACM Press, 2006, pp.221-238.

DOI: 10.1145/1180405.1180418

Google Scholar

[5] M. Pirretti, P. Traynor, P. McDaniel, B. Waters, Secure Attribute-Based Systems, Proc. of ACMCCS'06, ACM, 2006, pp.99-112.

DOI: 10.1145/1180405.1180419

Google Scholar

[6] J. Baek, W. Susilo, J. Zhou, New constructions of fuzzy identity-based encryption, Proc. of the2nd ACM Symposium on Information, Computer and Communications Security, ACM New York, NY, USA, 2007, pp.368-370.

DOI: 10.1145/1229285.1229330

Google Scholar

[7] M. Chase, Multi-authority attribute based encryption, Salil P. Vadhan (Ed. ): TCC 2007, vol. 4392 of LNCS, Springer-Verlag, 2007, pp.515-534.

Google Scholar

[8] D. Boneh, X. Boyen, and S. Halevi. Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles. David Pointcheval (Ed. ): RSA-CT '06, vol. 3860 of LNCS, Springer-Verlag, 2006, pp.226-243.

DOI: 10.1007/11605805_15

Google Scholar

[9] B. Waters, Efficient identity based encryption without random oracles, Ronald Cramer(Eds. ): Advances in Cryptology- EUROCRYPT, Springer-Verlag, 2005, vol. 3494 of LNCS, pp.114-127.

DOI: 10.1007/11426639_7

Google Scholar

[10] P.Y. Yang et al., Fuzzy Identity Based Signature, Preprint submitted to Elsevier Preprint, 2008/002.

Google Scholar

[11] C. Wang, J. Kim, Two Constructions of Fuzzy Identity Based Signature. International Conference on Biomedical Engineering and Informatics, 2009, pp.1-5.

DOI: 10.1109/bmei.2009.5305820

Google Scholar

[12] C. Wang, W. Chen, Y. Liu . A Fuzzy Identity Based Signature Scheme. International Conference on E-Business and Information System Security, 2009, pp.1-5.

DOI: 10.1109/ebiss.2009.5137871

Google Scholar

[13] L. Fan, J. Zheng and J. Yang. A BIOMETRIC IDENTITY BASED SIGNATURE SCHEME IN THE STANDARD MODEL. IEEE International Conference on Network Infrastructure and Digital Content, 2009. p.552 – 556.

DOI: 10.1109/icnidc.2009.5360996

Google Scholar

[14] Kenneth G. Paterson and Jacob C.N. Schuldt: Efficient Identity-Based Signatures Secure in the Standard Model. Proc. L. Batten and R. Safavi-Naini Eds. : ACISP, vol. 4058 of LNCS, Springer-Verlag, 2006, pp.207-222.

Google Scholar