Fuzzy Biometric-Based Encryption for Encrypted Data in the Cloud

被引:0
作者
Wu, Qing [1 ]
Zhang, Leyou [2 ]
Zhang, Jingxia [2 ]
机构
[1] XiAn Univ Posts & Telecommun, Sch Automat, Xian 710126, Peoples R China
[2] Xidian Univ, Sch Math & Stat, Xian 710071, Peoples R China
关键词
lattice encryption; fuzzy attribute-based encryption; LWE; cloud computing; IDENTITY-BASED ENCRYPTION;
D O I
10.1587/transfun.E100.A.1257
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fuzzy techniques can implement the fine-grained access control of encrypted data in the Cloud because they support error-tolerance. In this system, using biometric attributes such as fingerprints, faces and irises as pubic parameters is advantageous over those systems based on Public Key Infrastructure (PKI). This is because biometric information is unique, unforgettable and non-transferable. However the biometric-attribute measurements are noisy and most of the existing encryption systems can not support the biometric-attribute encryption. Additionally, the previous fuzzy encryption schemes only achieve the selective security which is a weak security model. To overcome these drawbacks, we propose a new fuzzy encryption scheme based on the lattice in this letter. The proposed scheme is based on a hierarchical identity-based encryption with fixed-dimensional private keys space and thus has short public parameters and short private keys, which results in high computation efficiency. Furthermore, it achieves the strong security, i.e., adaptive security. Lastly, the security is reduced to the learning with errors (LWE) problem in the standard model.
引用
收藏
页码:1257 / 1261
页数:5
相关论文
共 18 条
[1]  
Agrawal S, 2012, LECT NOTES COMPUT SC, V7293, P280, DOI 10.1007/978-3-642-30057-8_17
[2]  
Agrawal S, 2010, LECT NOTES COMPUT SC, V6223, P98, DOI 10.1007/978-3-642-14623-7_6
[3]  
Ahuja MS, 2011, COMM COM INF SC, V169, P505
[4]  
[Anonymous], 2009, 2009359 CRYPT EPRINT
[5]  
[Anonymous], 2014, PAIRING BASED CRYPTO
[6]  
[Anonymous], 2002, SPRINGER INT SERIES
[7]  
[Anonymous], LECT NOTES COMPUTER
[8]  
Brakerski Z, 2011, LECT NOTES COMPUT SC, V6841, P505, DOI 10.1007/978-3-642-22792-9_29
[9]  
Cash D, 2010, LECT NOTES COMPUT SC, V6110, P523
[10]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1