Please wait a minute...
Front. Inform. Technol. Electron. Eng.  2011, Vol. 12 Issue (10): 819-827    DOI: 10.1631/jzus.C1000429
    
CCA2 secure biometric identity based encryption with constant-size ciphertext
Yang Yang*,1,2, Yu-pu Hu1, Le-you Zhang3, Chun-hui Sun1
1 Department of Communication Engineering, Xidian University, Xi'an 710071, China 2 Department of Mathematics and Computer Science, Fuzhou University, Fuzhou 350002, China 3 Department of Mathematics Science, Xidian University, Xi\'an 710071, China
Download:   PDF(397KB)
Export: BibTeX | EndNote (RIS)      

Abstract  We propose a new biometric identity based encryption scheme (Bio-IBE), in which user biometric information is used to generate the public key with a fuzzy extractor. This is the first Bio-IBE scheme that achieves constant size ciphertext. This is also a scheme that is secure against the adaptive chosen ciphertext attack (CCA2). Details are presented along with a discussion of Shamir’s threshold secret sharing and fuzzy extraction of biometrics, which is based on error correction codes. We also define a security model and prove that the security of the proposed scheme is reduced to the decisional bilinear Diffie-Hellman (DBDH) assumption. The comparison shows that the proposed scheme has better efficiency and stronger security compared with the available Bio-IBE schemes.

Key wordsPublic key cryptography      Identity-based      Data security      Biometric      Encryption     
Received: 11 December 2010      Published: 08 October 2011
CLC:  TP309  
Cite this article:

Yang Yang, Yu-pu Hu, Le-you Zhang, Chun-hui Sun. CCA2 secure biometric identity based encryption with constant-size ciphertext. Front. Inform. Technol. Electron. Eng., 2011, 12(10): 819-827.

URL:

http://www.zjujournals.com/xueshu/fitee/10.1631/jzus.C1000429     OR     http://www.zjujournals.com/xueshu/fitee/Y2011/V12/I10/819


CCA2 secure biometric identity based encryption with constant-size ciphertext

We propose a new biometric identity based encryption scheme (Bio-IBE), in which user biometric information is used to generate the public key with a fuzzy extractor. This is the first Bio-IBE scheme that achieves constant size ciphertext. This is also a scheme that is secure against the adaptive chosen ciphertext attack (CCA2). Details are presented along with a discussion of Shamir’s threshold secret sharing and fuzzy extraction of biometrics, which is based on error correction codes. We also define a security model and prove that the security of the proposed scheme is reduced to the decisional bilinear Diffie-Hellman (DBDH) assumption. The comparison shows that the proposed scheme has better efficiency and stronger security compared with the available Bio-IBE schemes.

关键词: Public key cryptography,  Identity-based,  Data security,  Biometric,  Encryption 
[1] Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG. A leakage-resilient certificateless public key encryption#br# scheme with CCA2 security[J]. Front. Inform. Technol. Electron. Eng., 2018, 19(4): 481-493.
[2] Genlang CHEN, Zhiqian XU, Hai JIANG, Kuan-ching LI. Generic user revocation systems for attribute-based encryption in cloud storage[J]. Front. Inform. Technol. Electron. Eng., 2018, 19(11): 1362-1384.
[3] Guo-hai SITU, Hai-chao WANG. Phase problems in optical imaging[J]. Front. Inform. Technol. Electron. Eng., 2017, 18(9): 1277-1288.
[4] Gaurav Bansod, Narayan Pisharoty, Abhijit Patil. BORON: an ultra-lightweight and low power encryption design for pervasive computing[J]. Front. Inform. Technol. Electron. Eng., 2017, 18(3): 332-345.
[5] Feng-he Wang, Chun-xiao Wang, Zhen-hua Liu. Efficient hierarchical identity based encryption scheme in the standard model over lattices[J]. Front. Inform. Technol. Electron. Eng., 2016, 17(8): 781-791.
[6] Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan. ImgFS: a transparent cryptography for stored images using a filesystem in userspace[J]. Front. Inform. Technol. Electron. Eng., 2015, 16(1): 28-42.
[7] Shuang Tan, Yan Jia. NaEPASC: a novel and efficient public auditing scheme for cloud data[J]. Front. Inform. Technol. Electron. Eng., 2014, 15(9): 794-804.
[8] Can Wang, Hong Liu, Xing Liu. Contact-free and pose-invariant hand-biometric-based personal identification system using RGB and depth data[J]. Front. Inform. Technol. Electron. Eng., 2014, 15(7): 525-536.
[9] Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan. Performance study of selective encryption in comparison to full encryption for still visual images[J]. Front. Inform. Technol. Electron. Eng., 2014, 15(6): 435-444.
[10] Baiying Lei, Ing Yann Soon. A multipurpose audio watermarking algorithm with synchronization and encryption[J]. Front. Inform. Technol. Electron. Eng., 2012, 13(1): 11-19.