|
|
CCA2 secure biometric identity based encryption with constant-size ciphertext |
Yang Yang*,1,2, Yu-pu Hu1, Le-you Zhang3, Chun-hui Sun1 |
1 Department of Communication Engineering, Xidian University, Xi'an 710071, China 2 Department of Mathematics and Computer Science, Fuzhou University, Fuzhou 350002, China 3 Department of Mathematics Science, Xidian University, Xi\'an 710071, China |
|
|
Abstract We propose a new biometric identity based encryption scheme (Bio-IBE), in which user biometric information is used to generate the public key with a fuzzy extractor. This is the first Bio-IBE scheme that achieves constant size ciphertext. This is also a scheme that is secure against the adaptive chosen ciphertext attack (CCA2). Details are presented along with a discussion of Shamir’s threshold secret sharing and fuzzy extraction of biometrics, which is based on error correction codes. We also define a security model and prove that the security of the proposed scheme is reduced to the decisional bilinear Diffie-Hellman (DBDH) assumption. The comparison shows that the proposed scheme has better efficiency and stronger security compared with the available Bio-IBE schemes.
|
Received: 11 December 2010
Published: 08 October 2011
|
|
CCA2 secure biometric identity based encryption with constant-size ciphertext
We propose a new biometric identity based encryption scheme (Bio-IBE), in which user biometric information is used to generate the public key with a fuzzy extractor. This is the first Bio-IBE scheme that achieves constant size ciphertext. This is also a scheme that is secure against the adaptive chosen ciphertext attack (CCA2). Details are presented along with a discussion of Shamir’s threshold secret sharing and fuzzy extraction of biometrics, which is based on error correction codes. We also define a security model and prove that the security of the proposed scheme is reduced to the decisional bilinear Diffie-Hellman (DBDH) assumption. The comparison shows that the proposed scheme has better efficiency and stronger security compared with the available Bio-IBE schemes.
关键词:
Public key cryptography,
Identity-based,
Data security,
Biometric,
Encryption
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|