CCA2 secure biometric identity based encryption with constant-size ciphertext  被引量:1

CCA2 secure biometric identity based encryption with constant-size ciphertext

在线阅读下载全文

作  者:Yang YANG Yu-pu HU Le-you ZHANG Chun-hui SUN 

机构地区:[1]Department of Communication Engineering, Xidian University, Xi'an 710071, China [2]Department of Mathematics and Computer Science, Fuzhou University, Fuzhou 350002, China [3]Department of Mathematics Science, Xidian University, Xi'an 710071, China

出  处:《Journal of Zhejiang University-Science C(Computers and Electronics)》2011年第10期819-827,共9页浙江大学学报C辑(计算机与电子(英文版)

基  金:Project supported by the National Basic Research Program(973) of China (No. 2007CB311201);the National Natural Science Foundation of China (Nos. 60970119,60803149,60833008,and 61072067)

摘  要:We propose a new biometric identity based encryption scheme (Bio-IBE), in which user biometric information is used to generate the public key with a fuzzy extractor. This is the first Bio-IBE scheme that achieves constant size ciphertext. This is also a scheme that is secure against the adaptive chosen ciphertext attack (CCA2). Details are presented along with a discussion of Shamir's threshold secret sharing and fuzzy extraction of biometrics, which is based on error correction codes. We also define a security model and prove that the security of the proposed scheme is reduced to the decisional bilinear Diffie-Hellman proposed scheme has better efficiency and stronger security (DBDH) assumption. The comparison shows that the compared with the available Bio-IBE schemes.We propose a new biometric identity based encryption scheme (Bio-IBE),in which user biometric information is used to generate the public key with a fuzzy extractor.This is the first Bio-IBE scheme that achieves constant size ciphertext.This is also a scheme that is secure against the adaptive chosen ciphertext attack (CCA2).Details are presented along with a discussion of Shamir's threshold secret sharing and fuzzy extraction of biometrics,which is based on error correction codes.We also define a security model and prove that the security of the proposed scheme is reduced to the decisional bilinear Diffie-Hellman (DBDH) assumption.The comparison shows that the proposed scheme has better efficiency and stronger security compared with the available Bio-IBE schemes.

关 键 词:Public key cryptography IDENTITY-BASED Data security BIOMETRIC ENCRYPTION 

分 类 号:TP391.4[自动化与计算机技术—计算机应用技术] TN918[自动化与计算机技术—计算机科学与技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象