CCA2 secure biometric identity based encryption with constant-size ciphertext

被引:0
|
作者
Yang YANG 1
机构
基金
中国国家自然科学基金;
关键词
Public key cryptography; Identity-based; Data security; Biometric; Encryption;
D O I
暂无
中图分类号
TP309.7 [加密与解密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
We propose a new biometric identity based encryption scheme (Bio-IBE),in which user biometric information is used to generate the public key with a fuzzy extractor.This is the first Bio-IBE scheme that achieves constant size ciphertext.This is also a scheme that is secure against the adaptive chosen ciphertext attack (CCA2).Details are presented along with a discussion of Shamir’s threshold secret sharing and fuzzy extraction of biometrics,which is based on error correction codes.We also define a security model and prove that the security of the proposed scheme is reduced to the decisional bilinear Diffie-Hellman (DBDH) assumption.The comparison shows that the proposed scheme has better efficiency and stronger security compared with the available Bio-IBE schemes.
引用
收藏
页码:819 / 827
页数:9
相关论文
共 50 条
  • [1] CCA2 secure biometric identity based encryption with constant-size ciphertext
    Yang, Yang
    Hu, Yu-pu
    Zhang, Le-you
    Sun, Chun-hui
    [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2011, 12 (10): : 819 - 827
  • [2] CCA2 secure biometric identity based encryption with constant-size ciphertext
    Yang Yang
    Yu-pu Hu
    Le-you Zhang
    Chun-hui Sun
    [J]. Journal of Zhejiang University SCIENCE C, 2011, 12 : 819 - 827
  • [3] Short-ciphertext and BDH-based CCA2 secure certificateless encryption
    SUN YinXia & LI Hui 1 Key Lab of Computer Networks and Information Security
    [J]. Science China(Information Sciences), 2010, 53 (10) : 2005 - 2015
  • [4] Short-ciphertext and BDH-based CCA2 secure certificateless encryption
    YinXia Sun
    Hui Li
    [J]. Science China Information Sciences, 2010, 53 : 2005 - 2015
  • [5] Short-ciphertext and BDH-based CCA2 secure certificateless encryption
    Sun YinXia
    Li Hui
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (10) : 2005 - 2015
  • [6] Efficient dynamic threshold identity-based encryption with constant-size ciphertext
    Susilo, Willy
    Guo, Fuchun
    Mu, Yi
    [J]. THEORETICAL COMPUTER SCIENCE, 2016, 609 : 49 - 59
  • [7] Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext
    Liqing Chen
    Jiguo Li
    Yichen Zhang
    [J]. Soft Computing, 2020, 24 : 4589 - 4606
  • [8] Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext
    Chen, Liqing
    Li, Jiguo
    Zhang, Yichen
    [J]. SOFT COMPUTING, 2020, 24 (06) : 4589 - 4606
  • [9] Fully CCA2 secure identity based broadcast encryption without random oracles
    Ren, Yanli
    Gu, Dawu
    [J]. INFORMATION PROCESSING LETTERS, 2009, 109 (11) : 527 - 533
  • [10] Efficient Hidden Vector Encryption with Constant-Size Ciphertext
    Tran Viet Xuan Phuong
    Yang, Guomin
    Susilo, Willy
    [J]. COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 472 - 487