Communications of the ACM
Secure attribute-based systems
Proceedings of the 13th ACM conference on Computer and communications security
On computable isomorphisms in efficient asymmetric pairing-based systems
Discrete Applied Mathematics
New constructions of fuzzy identity-based encryption
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Attribute-based Signature Scheme
ISA '08 Proceedings of the 2008 International Conference on Information Security and Assurance (isa 2008)
A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
A New Biometric Identity Based Encryption Scheme
ICYCS '08 Proceedings of the 2008 The 9th International Conference for Young Computer Scientists
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Efficient identity-based encryption without random oracles
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Secure remote authentication using biometric data
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Security proof of sakai-kasahara's identity-based encryption scheme
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Generic constructions of biometric identity based encryption systems
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
A biometric identity-based signcryption scheme
Future Generation Computer Systems
Hi-index | 0.00 |
In this paper, we describe a new biometric Identity Based Signature (IBS) scheme based on the Sakai Kasahara Key Construction and prove its security in the framework of a stronger security model compared to exisiting adversarial models. Besides, we present a new type of a denial of service (DoS) attack and evaluate existing biometric IBS schemes in this context. Based on the recently defined privacy notions, we show that our scheme achieves weak signer-attribute privacy and the security is reduced to the k-DHI computational problem in the ROM with an efficient reduction. Finally, our scheme is compared to other error tolerant signature schemes and shown to be much more efficient in terms of its each phase.