CCA2 secure biometric identity based encryption with constant-size ciphertext

被引:0
|
作者
Yang Yang
Yu-pu Hu
Le-you Zhang
Chun-hui Sun
机构
[1] Xidian University,Department of Communication Engineering
[2] Fuzhou University,Department of Mathematics and Computer Science
[3] Xidian University,Department of Mathematics Science
关键词
Public key cryptography; Identity-based; Data security; Biometric; Encryption; TP309;
D O I
暂无
中图分类号
学科分类号
摘要
We propose a new biometric identity based encryption scheme (Bio-IBE), in which user biometric information is used to generate the public key with a fuzzy extractor. This is the first Bio-IBE scheme that achieves constant size ciphertext. This is also a scheme that is secure against the adaptive chosen ciphertext attack (CCA2). Details are presented along with a discussion of Shamir’s threshold secret sharing and fuzzy extraction of biometrics, which is based on error correction codes. We also define a security model and prove that the security of the proposed scheme is reduced to the decisional bilinear Diffie-Hellman (DBDH) assumption. The comparison shows that the proposed scheme has better efficiency and stronger security compared with the available Bio-IBE schemes.
引用
收藏
页码:819 / 827
页数:8
相关论文
共 50 条
  • [2] CCA2 secure biometric identity based encryption with constant-size ciphertext
    Yang, Yang
    Hu, Yu-pu
    Zhang, Le-you
    Sun, Chun-hui
    [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2011, 12 (10): : 819 - 827
  • [3] CCA2 secure biometric identity based encryption with constant-size ciphertext
    Yang YANG Yupu HU Leyou ZHANG Chunhui SUN Department of Communication EngineeringXidian UniversityXian China Department of Mathematics and Computer ScienceFuzhou UniversityFuzhou China Department of Mathematics ScienceXidian UniversityXian China
    [J]. Journal of Zhejiang University-Science C(Computers & Electronics)., 2011, 12 (10) - 827
  • [4] Short-ciphertext and BDH-based CCA2 secure certificateless encryption
    SUN YinXia & LI Hui 1 Key Lab of Computer Networks and Information Security
    [J]. Science China(Information Sciences), 2010, 53 (10) : 2005 - 2015
  • [5] Short-ciphertext and BDH-based CCA2 secure certificateless encryption
    YinXia Sun
    Hui Li
    [J]. Science China Information Sciences, 2010, 53 : 2005 - 2015
  • [6] Short-ciphertext and BDH-based CCA2 secure certificateless encryption
    Sun YinXia
    Li Hui
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (10) : 2005 - 2015
  • [7] Efficient dynamic threshold identity-based encryption with constant-size ciphertext
    Susilo, Willy
    Guo, Fuchun
    Mu, Yi
    [J]. THEORETICAL COMPUTER SCIENCE, 2016, 609 : 49 - 59
  • [8] Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext
    Liqing Chen
    Jiguo Li
    Yichen Zhang
    [J]. Soft Computing, 2020, 24 : 4589 - 4606
  • [9] Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext
    Chen, Liqing
    Li, Jiguo
    Zhang, Yichen
    [J]. SOFT COMPUTING, 2020, 24 (06) : 4589 - 4606
  • [10] Fully CCA2 secure identity based broadcast encryption without random oracles
    Ren, Yanli
    Gu, Dawu
    [J]. INFORMATION PROCESSING LETTERS, 2009, 109 (11) : 527 - 533