A new biometric identity based encryption scheme secure against DoS attacks

被引:11
|
作者
Sarier, Neyire Deniz [1 ]
机构
[1] Bonn Aachen Int Ctr Informat Technol, Comp Secur Grp, D-53113 Bonn, Germany
关键词
biometrics; fuzzy IBE; fuzzy extraction; DoS attack; SIGNATURES; EFFICIENT;
D O I
10.1002/sec.162
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, Sarier [1] proposed an efficient biometric Identity Based Encryption (IBE) scheme called BIO-IBE using the Sakai Kasahara Key Construction and proved its security in the Random Oracle Model (ROM) based on the well-exploited k-BDHI computational problem. Despite its efficiency compared to other fuzzy IBE systems implemented for biometric identities, BIO-IBE is not secure against a new type of denial of service (DoS) attack that we present. In this context, we describe a new biometric IBE scheme and show that our scheme is immune against this attack due to the signature applied on the public value PAR of the user. This way, the sender can detect whether PAR of the receiver that is stored publicly is modified by an active adversary, thus the generation of a ciphertext based on a wrong identity is avoided. The main difference of the new scheme is the structure of the key generation algorithm, where a unique biometric identity string ID obtained from the biometric attributes is used instead of picking a different polynomial for each user as in other fuzzy IBE schemes. In addition to the well-defined security model for current fuzzy IBE schemes, we describe a stronger security model and prove the security of our scheme in this framework achieving a better reduction cost compared to BIO-IBE. Finally, our scheme provides security against DoS attacks and better efficiency in terms of the key generation and decryption algorithms compared to the existing fuzzy IBE schemes. Copyright (C) 2009 John Wiley & Sons, Ltd.
引用
收藏
页码:23 / 32
页数:10
相关论文
共 50 条
  • [41] A CHOSEN-CIPHERTEXT SECURE IDENTITY-BASED BROADCAST ENCRYPTION SCHEME
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 3556 - +
  • [42] A new threshold signature scheme based on fuzzy biometric identity
    Yongquan Cai
    Progress in Natural Science, 2009, 19 (08) : 1021 - 1025
  • [43] A new threshold signature scheme based on fuzzy biometric identity
    Cai, Yongquan
    Zhang, Ke
    PROGRESS IN NATURAL SCIENCE-MATERIALS INTERNATIONAL, 2009, 19 (08) : 1021 - 1025
  • [44] A New Secure Encryption Scheme Based on Group Factorization Problem
    Cong, Yue
    Hong, Haibo
    Shao, Jun
    Han, Song
    Lin, Jianhong
    Zhao, Shuai
    IEEE ACCESS, 2019, 7 : 168728 - 168735
  • [45] A biometric identity based signature scheme
    Computer Security and Cryptography Group, Computer Science Department NUI Maynooth, Co. Kildare, Ireland
    Int. J. Netw. Secur., 2007, 3 (317-326):
  • [46] Certificateless searchable public key encryption scheme secure against keyword guessing attacks for smart healthcare
    Ma, Mimi
    He, Debiao
    Fan, Shuqin
    Feng, Dengguo
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 50 (50)
  • [47] An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks
    Huang, Qiong
    Li, Hongbo
    INFORMATION SCIENCES, 2017, 403 : 1 - 14
  • [48] On the Feasibility of Identity-Based Encryption with Equality Test Against Insider Attacks
    Emura, Keita
    INFORMATION SECURITY AND PRIVACY, PT I, ACISP 2024, 2024, 14895 : 261 - 280
  • [49] Hierarchical and Efficient Identity-based Encryption Against Side Channel Attacks
    Yu, Qihong
    Shen, Jian
    Li, Jiguo
    Ji, Sai
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (06) : 629 - 640
  • [50] A Multigain-Switching-Mechanism-Based Secure Estimation Scheme Against DoS Attacks for Nonlinear Industrial Cyber-Physical Systems
    Yan, Jing-Jing
    Yang, Guang-Hong
    Liu, Xiao-Xu
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2023, 70 (05) : 5094 - 5103