A new biometric identity based encryption scheme secure against DoS attacks

被引:11
|
作者
Sarier, Neyire Deniz [1 ]
机构
[1] Bonn Aachen Int Ctr Informat Technol, Comp Secur Grp, D-53113 Bonn, Germany
关键词
biometrics; fuzzy IBE; fuzzy extraction; DoS attack; SIGNATURES; EFFICIENT;
D O I
10.1002/sec.162
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Sarier [1] proposed an efficient biometric Identity Based Encryption (IBE) scheme called BIO-IBE using the Sakai Kasahara Key Construction and proved its security in the Random Oracle Model (ROM) based on the well-exploited k-BDHI computational problem. Despite its efficiency compared to other fuzzy IBE systems implemented for biometric identities, BIO-IBE is not secure against a new type of denial of service (DoS) attack that we present. In this context, we describe a new biometric IBE scheme and show that our scheme is immune against this attack due to the signature applied on the public value PAR of the user. This way, the sender can detect whether PAR of the receiver that is stored publicly is modified by an active adversary, thus the generation of a ciphertext based on a wrong identity is avoided. The main difference of the new scheme is the structure of the key generation algorithm, where a unique biometric identity string ID obtained from the biometric attributes is used instead of picking a different polynomial for each user as in other fuzzy IBE schemes. In addition to the well-defined security model for current fuzzy IBE schemes, we describe a stronger security model and prove the security of our scheme in this framework achieving a better reduction cost compared to BIO-IBE. Finally, our scheme provides security against DoS attacks and better efficiency in terms of the key generation and decryption algorithms compared to the existing fuzzy IBE schemes. Copyright (C) 2009 John Wiley & Sons, Ltd.
引用
收藏
页码:23 / 32
页数:10
相关论文
共 50 条
  • [31] Network Adversary Attacks against Secure Encryption Schemes
    Gligor, Virgil D.
    Parno, Bryan
    Shin, Ji Sun
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2015, E98B (02) : 267 - 279
  • [32] Identity-Based Encryption Secure against Selective Opening Attack
    Bellare, Mihir
    Waters, Brent
    Yilek, Scott
    THEORY OF CRYPTOGRAPHY, 2011, 6597 : 235 - +
  • [33] CCA2 secure biometric identity based encryption with constant-size ciphertext
    Yang YANG Yupu HU Leyou ZHANG Chunhui SUN Department of Communication EngineeringXidian UniversityXian China Department of Mathematics and Computer ScienceFuzhou UniversityFuzhou China Department of Mathematics ScienceXidian UniversityXian China
    JournalofZhejiangUniversity-ScienceC(Computers&Electronics), 2011, 12 (10) : 819 - 827
  • [34] CCA2 secure biometric identity based encryption with constant-size ciphertext
    Yang, Yang
    Hu, Yu-pu
    Zhang, Le-you
    Sun, Chun-hui
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2011, 12 (10): : 819 - 827
  • [35] CCA2 secure biometric identity based encryption with constant-size ciphertext
    Yang Yang
    Yu-pu Hu
    Le-you Zhang
    Chun-hui Sun
    Journal of Zhejiang University SCIENCE C, 2011, 12 : 819 - 827
  • [36] Efficient biometric identity-based encryption
    Li, Xiaoguo
    Xiang, Tao
    Chen, Fei
    Guo, Shangwei
    INFORMATION SCIENCES, 2018, 465 : 248 - 264
  • [38] A general framework for secure biometric hashing against reconstruction attacks
    Lianyi Yu
    Yan Wo
    Applied Intelligence, 2023, 53 : 12811 - 12830
  • [39] A general framework for secure biometric hashing against reconstruction attacks
    Yu, Lianyi
    Wo, Yan
    APPLIED INTELLIGENCE, 2023, 53 (10) : 12811 - 12830
  • [40] Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles
    Thorncharoensri, Pairat
    Susilo, Willy
    Mu, Yi
    INFORMATION SECURITY APPLICATIONS, 2009, 5932 : 94 - 108