Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
Secure attribute-based systems
Proceedings of the 13th ACM conference on Computer and communications security
A forward-secure public-key encryption scheme
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
A New Approach for Biometric Template Storage and Remote Authentication
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Hidden attribute-based signatures without anonymity revocation
Information Sciences: an International Journal
Improving the accuracy and storage cost in biometric remote authentication schemes
Journal of Network and Computer Applications
Searching keywords with wildcards on encrypted data
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Biometric identity based signature revisited
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
Fuzzy identity based signature with applications to biometric authentication
Computers and Electrical Engineering
Attribute-based encryption without key cloning
International Journal of Applied Cryptography
Fuzzy biometric signcryption scheme with bilinear pairings in the standard model
PAISI'10 Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics
Generic constructions of biometric identity based encryption systems
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Attribute-based encryption without key cloning
International Journal of Applied Cryptography
A biometric identity-based signcryption scheme
Future Generation Computer Systems
On the realization of fuzzy identity-based identification scheme using fingerprint biometrics
Security and Communication Networks
Hi-index | 0.00 |
In this paper we construct two new fuzzy identity-based encryption (IBE) schemes in the random oracle model. Not only do our schemes provide public parameters whose size is independent of the number of attributes in each identity (used as public key) but they also have useful structures which result in more efficient key extraction and/or encryption than the random oracle version of Sahai and Water's fuzzy IBE scheme, considered recently by Pirretti et al. We prove that the confidentiality of the proposed schemes is relative to the Bilinear Decisional Bilinear Diffie-Hellman problem.