An Efficient Fuzzy Identity-based Signature Scheme without Bilinear Pairings

被引:4
作者
Wang, Changji [1 ]
机构
[1] Yunnan Univ, Natl Pilot Sch Software, Kunming, Peoples R China
来源
2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS) | 2014年
关键词
Identity-based Signature; Fuzzy Identity-based Encryption; Fuzzy Identity-based Signature; Selective-Set Model; Biometric;
D O I
10.1109/CIS.2014.101
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Biometric-based signature is an emerging cryptographic primitive that allows a user with a biometric identity to produce a signature that can be verified successfully using another biometric identity if both biometric identities are within a predefined distance metric. Fuzzy identity-based signature is of particular value for biometric authentication, where biometric identifiers such as fingerprints, iris and voice are used in human identification. Unfortunately, constructions of fuzzy identity-based signature scheme so far are based on bilinear pairings that need costly operations. In this paper, we propose a new fuzzy identity-based signature scheme that does not depend on bilinear pairings. With both the running time and the size of the signature being saved greatly, our scheme is more practical than the previous related schemes for practical application. The proposed fuzzy identity-based signature scheme is proved to be existential unforgeability against adaptively chosen message attack under the standard discrete logarithm assumption in the selective-set model.
引用
收藏
页码:440 / 444
页数:5
相关论文
共 18 条
  • [1] [Anonymous], 2007, FDN SECURITY ANAL DE
  • [2] [Anonymous], 2011, 4 IFIP INT C NEW TEC, DOI DOI 10.1109/NTMS.2011.5721040
  • [3] [Anonymous], AFRICACRYPT 2009
  • [4] [Anonymous], INFORM SCI
  • [5] [Anonymous], 2007, P 2 ACM S INFORM COM
  • [6] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [7] Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
  • [8] Chen W, 2009, NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, P192, DOI 10.1109/NSS.2009.40
  • [9] Goyal V., 2006, P 2006 INT C PRIVACY, P1
  • [10] Security arguments for digital signatures and blind signatures
    Pointcheval, D
    Stern, J
    [J]. JOURNAL OF CRYPTOLOGY, 2000, 13 (03) : 361 - 396