Fuzzy identity-based encryption

被引:2770
|
作者
Sahai, A [1 ]
Waters, B
机构
[1] Univ Calif Los Angeles, Los Angeles, CA 90024 USA
[2] Stanford Univ, Stanford, CA 94305 USA
关键词
D O I
10.1007/11426639_27
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy Identity-Based Encryption. In Fuzzy IBE we view an identity as set of descriptive attributes. A Fuzzy IBE scheme allows for a private key for an identity, omega, to decrypt a ciphertext encrypted with an identity, omega', if and only if the identities omega and omega' are close to each other as measured by the "set overlap" distance metric. A Fuzzy IBE scheme can be applied to enable encryption using biometric inputs as identities; the error-tolerance property of a Fuzzy IBE scheme is precisely what allows for the use of biometric identities, which inherently will have some noise each time they are sampled. Additionally, we show that Fuzzy-IBE can be used for a type of application that we term "attribute-based encryption". In this paper we present two constructions of Fuzzy IBE schemes. Our constructions can be viewed as an Identity-Based Encryption of a message under several attributes that compose a (fuzzy) identity. Our IBE schemes are both error-tolerant and secure against collusion attacks. Additionally, our basic construction does not use random oracles. We prove the security of our schemes under the Selective-ID security model.
引用
收藏
页码:457 / 473
页数:17
相关论文
共 50 条
  • [1] Improvement on a Fuzzy Identity-based Encryption Scheme
    Zhang, Guoyan
    Wang, Feng
    [J]. JOURNAL OF COMPUTERS, 2014, 9 (11) : 2727 - 2732
  • [2] New Construction of Fuzzy Identity-Based Encryption
    Li, XiMing
    Yang, Bo
    Zhang, MingWu
    [J]. 2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL I, 2009, : 647 - 651
  • [3] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    [J]. COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
  • [4] Secure Symmetric Key Fuzzy Identity-Based Encryption
    Liu, Pengtao
    [J]. MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2665 - 2668
  • [5] SECURITY ANALYSIS OF A FUZZY IDENTITY-BASED ENCRYPTION SCHEME
    Tian, Miaomiao
    Huang, Liusheng
    Yang, Wei
    [J]. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2014, 23 (03)
  • [6] Fuzzy Identity-based Encryption: New and Efficient Schemes
    Baek, Joonsang
    Susilo, Willy
    Zhou, Jianying
    [J]. CODING AND CRYPTOLOGY, 2008, 4 : 1 - +
  • [7] Anonymous Fuzzy Identity-Based Encryption for Similarity Search
    Cheung, David W.
    Mamoulis, Nikos
    Wong, W. K.
    Yiu, S. M.
    Zhang, Ye
    [J]. ALGORITHMS AND COMPUTATION, PT I, 2010, 6506 : 61 - 72
  • [8] Fuzzy Identity-Based Matchmaking Encryption and Its Application
    Wu, Axin
    Luo, Weiqi
    Weng, Jian
    Yang, Anjia
    Wen, Jinghang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5592 - 5607
  • [9] New Fuzzy Identity-Based Encryption in the Standard Model
    Ren, Yanli
    Gu, Dawu
    Wang, Shuozhong
    Zhang, Xinpeng
    [J]. INFORMATICA, 2010, 21 (03) : 393 - 407
  • [10] Wildcarded Identity-Based Encryption
    Michel Abdalla
    James Birkett
    Dario Catalano
    Alexander W. Dent
    John Malone-Lee
    Gregory Neven
    Jacob C. N. Schuldt
    Nigel P. Smart
    [J]. Journal of Cryptology, 2011, 24 : 42 - 82