A Biometric Signcryption Scheme without Bilinear Pairing

被引:0
|
作者
Wang, Mingwen [1 ,2 ]
Ren, Zhiyuan [2 ]
Cai, Jun [2 ]
Zheng, Wentao [2 ]
机构
[1] South West Jiaotong Univ, Informat Res Inst, Chengdu 610031, Peoples R China
[2] Informat Ctr Dongfang Boiler Grp Co Ltd, Zigong 643000, Peoples R China
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Cryptography; scheme; signcryption; biometric; bilinear pairing;
D O I
10.1117/12.2002003
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
How to apply the entropy in biometrics into the encryption and remote authentication schemes to simplify the management of keys is a hot research area. Utilizing Dodis's fuzzy extractor method and Liu's original signcryption scheme, a biometric identity based signcryption scheme is proposed in this paper. The proposed scheme is more efficient than most of the previous proposed biometric signcryption schemes for that it does not need bilinear pairing computation and modular exponentiation computation which is time consuming largely. The analysis results show that under the CDH and DL hard problem assumption, the proposed scheme has the features of confidentiality and unforgeability simultaneously.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Secure Certificateless Signcryption Scheme without Bilinear Pairing
    Zhou Y.-W.
    Yang B.
    Wang Q.-L.
    [J]. Ruan Jian Xue Bao/Journal of Software, 2017, 28 (10): : 2757 - 2768
  • [2] Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing
    Shi, Wenbo
    Kumar, Neeraj
    Gong, Peng
    Zhang, Zezhong
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2014, 8 (04) : 656 - 666
  • [3] Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing
    Wenbo Shi
    Neeraj Kumar
    Peng Gong
    Zezhong Zhang
    [J]. Frontiers of Computer Science, 2014, 8 : 656 - 666
  • [4] Security analysis and improvement of certificateless signcryption scheme without bilinear pairing
    Zhou Y.-W.
    Yang B.
    Zhang W.-Z.
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2016, 39 (06): : 1257 - 1266
  • [5] Certificateless signcryption scheme based on bilinear pairing
    Tang, Peng-zhi
    Zhang, Qing-lan
    Yang, Jun-fang
    [J]. WIRELESS COMMUNICATION AND SENSOR NETWORK, 2016, : 387 - 395
  • [6] Certificateless signcryption scheme without pairing
    Zhu, Hui
    Li, Hui
    Wang, Yumin
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2010, 47 (09): : 1587 - 1594
  • [7] Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model
    Zhang, Mingwu
    Yang, Bo
    Takagi, Tsuyoshi
    Shen, Yanping
    Zhang, Wenzheng
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2010, 6122 : 77 - +
  • [8] A Practical Identity Based Signcryption Scheme from Bilinear Pairing
    Karati, Arijit
    Biswas, G. P.
    [J]. 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 832 - 836
  • [9] Multi-signcryption scheme using identity and bilinear pairing
    Zhang, Chuan-Rong
    Xiao, Guo-Zhen
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2007, 34 (02): : 270 - 273
  • [10] Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing
    Zhou Yanwei
    Yang Bo
    Zhang Wenzheng
    [J]. DISCRETE APPLIED MATHEMATICS, 2016, 204 : 185 - 202