CCA2 secure biometric identity based encryption with constant-size ciphertext

被引:1
|
作者
Yang, Yang [1 ,2 ]
Hu, Yu-pu [1 ]
Zhang, Le-you [3 ]
Sun, Chun-hui [1 ]
机构
[1] Xidian Univ, Dept Commun Engn, Xian 710071, Peoples R China
[2] Fuzhou Univ, Dept Math & Comp Sci, Fuzhou 350002, Peoples R China
[3] Xidian Univ, Dept Math Sci, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
Public key cryptography; Identity-based; Data security; Biometric; Encryption;
D O I
10.1631/jzus.C1000429
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a new biometric identity based encryption scheme (Bio-IBE), in which user biometric information is used to generate the public key with a fuzzy extractor. This is the first Bio-IBE scheme that achieves constant size ciphertext. This is also a scheme that is secure against the adaptive chosen ciphertext attack (CCA2). Details are presented along with a discussion of Shamir's threshold secret sharing and fuzzy extraction of biometrics, which is based on error correction codes. We also define a security model and prove that the security of the proposed scheme is reduced to the decisional bilinear Diffie-Hellman (DBDH) assumption. The comparison shows that the proposed scheme has better efficiency and stronger security compared with the available Bio-IBE schemes.
引用
收藏
页码:819 / 827
页数:9
相关论文
共 50 条
  • [2] CCA2 secure biometric identity based encryption with constant-size ciphertext
    Yang Yang
    Yu-pu Hu
    Le-you Zhang
    Chun-hui Sun
    [J]. Journal of Zhejiang University SCIENCE C, 2011, 12 : 819 - 827
  • [3] CCA2 secure biometric identity based encryption with constant-size ciphertext
    Yang YANG Yupu HU Leyou ZHANG Chunhui SUN Department of Communication EngineeringXidian UniversityXian China Department of Mathematics and Computer ScienceFuzhou UniversityFuzhou China Department of Mathematics ScienceXidian UniversityXian China
    [J]. Journal of Zhejiang University-Science C(Computers & Electronics)., 2011, 12 (10) - 827
  • [4] Short-ciphertext and BDH-based CCA2 secure certificateless encryption
    SUN YinXia & LI Hui 1 Key Lab of Computer Networks and Information Security
    [J]. Science China(Information Sciences), 2010, 53 (10) : 2005 - 2015
  • [5] Short-ciphertext and BDH-based CCA2 secure certificateless encryption
    YinXia Sun
    Hui Li
    [J]. Science China Information Sciences, 2010, 53 : 2005 - 2015
  • [6] Short-ciphertext and BDH-based CCA2 secure certificateless encryption
    Sun YinXia
    Li Hui
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (10) : 2005 - 2015
  • [7] Efficient dynamic threshold identity-based encryption with constant-size ciphertext
    Susilo, Willy
    Guo, Fuchun
    Mu, Yi
    [J]. THEORETICAL COMPUTER SCIENCE, 2016, 609 : 49 - 59
  • [8] Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext
    Liqing Chen
    Jiguo Li
    Yichen Zhang
    [J]. Soft Computing, 2020, 24 : 4589 - 4606
  • [9] Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext
    Chen, Liqing
    Li, Jiguo
    Zhang, Yichen
    [J]. SOFT COMPUTING, 2020, 24 (06) : 4589 - 4606
  • [10] Fully CCA2 secure identity based broadcast encryption without random oracles
    Ren, Yanli
    Gu, Dawu
    [J]. INFORMATION PROCESSING LETTERS, 2009, 109 (11) : 527 - 533