Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
New constructions of fuzzy identity-based encryption
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups
Journal of Cryptology
A new signature scheme without random oracles
International Journal of Security and Networks
Identity based signcryption scheme without random oracles
Computer Standards & Interfaces
Fully CCA2 secure identity based broadcast encryption without random oracles
Information Processing Letters
Certificateless signcryption scheme in the standard model
Information Sciences: an International Journal
Efficient identity-based encryption without random oracles
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Practical identity-based encryption without random oracles
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Hi-index | 0.00 |
A new cryptographic primitive, called fuzzy biometric signcryption scheme which can perform confidentiality and authentication in a logic step while the sender and receiver identities are based on the fuzzy biometric string, is proposed. The proposed scheme possesses the error-tolerance property that allows a user with the private key for fuzzy biometric string b to decrypt a message for string b′ if and only if b and b′ are within a distance t. After given the scheme model and security definitions, a fuzzy biometric signcryption scheme in the standard model is proposed and then then security are analyzed including indistinguishable against adaptively chosen ciphertext attack and existentially unforgeable against adaptively chosen message attack.