检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Yang YANG Yu-pu HU Le-you ZHANG Chun-hui SUN
机构地区:[1]Department of Communication Engineering, Xidian University, Xi'an 710071, China [2]Department of Mathematics and Computer Science, Fuzhou University, Fuzhou 350002, China [3]Department of Mathematics Science, Xidian University, Xi'an 710071, China
出 处:《Journal of Zhejiang University-Science C(Computers and Electronics)》2011年第10期819-827,共9页浙江大学学报C辑(计算机与电子(英文版)
基 金:Project supported by the National Basic Research Program(973) of China (No. 2007CB311201);the National Natural Science Foundation of China (Nos. 60970119,60803149,60833008,and 61072067)
摘 要:We propose a new biometric identity based encryption scheme (Bio-IBE), in which user biometric information is used to generate the public key with a fuzzy extractor. This is the first Bio-IBE scheme that achieves constant size ciphertext. This is also a scheme that is secure against the adaptive chosen ciphertext attack (CCA2). Details are presented along with a discussion of Shamir's threshold secret sharing and fuzzy extraction of biometrics, which is based on error correction codes. We also define a security model and prove that the security of the proposed scheme is reduced to the decisional bilinear Diffie-Hellman proposed scheme has better efficiency and stronger security (DBDH) assumption. The comparison shows that the compared with the available Bio-IBE schemes.We propose a new biometric identity based encryption scheme (Bio-IBE),in which user biometric information is used to generate the public key with a fuzzy extractor.This is the first Bio-IBE scheme that achieves constant size ciphertext.This is also a scheme that is secure against the adaptive chosen ciphertext attack (CCA2).Details are presented along with a discussion of Shamir's threshold secret sharing and fuzzy extraction of biometrics,which is based on error correction codes.We also define a security model and prove that the security of the proposed scheme is reduced to the decisional bilinear Diffie-Hellman (DBDH) assumption.The comparison shows that the proposed scheme has better efficiency and stronger security compared with the available Bio-IBE schemes.
关 键 词:Public key cryptography IDENTITY-BASED Data security BIOMETRIC ENCRYPTION
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.28