Argument on biometrics identity-based encryption schemes
نویسندگان
چکیده
Recently, a few biometric identity-based encryption (BIO-IBE) schemes have been proposed. BIO-IBE leverages both fuzzy extractor and Lagrange polynomial to extract biometric feature as a user public key and as a preventive measure of collusion attack, respectively. In this paper, we reveal that BIO-IBE is not realistic whereby a query of fresh biometrics is needed for each encryption process. Moreover, the use of both fuzzy extractor and Lagrange polynomial in BIO-IBE simultaneously is a redundancy; it confers no advantage, but simply computational overhead. Therefore, we amend the progression of the BIO-IBE scheme by eliminating either Lagrange polynomial or fuzzy extractor to alleviate computational complexity. Subsequently, we demonstrate that the amendment does not compromise the security of the BIO-IBE scheme. Such amendments can be applied to other BIO-IBE schemes as well. Copyright © 2013 John Wiley & Sons, Ltd.
منابع مشابه
Generic Constructions of Biometric Identity Based Encryption Systems
In this paper, we present a novel framework for the generic construction of biometric Identity Based Encryption (IBE) schemes, which do not require bilinear pairings and result in more efficient schemes than existing fuzzy IBE systems implemented for biometric identities. Also, we analyze the security properties that are specific to biometric IBE namely anonymity and identity privacy. Consideri...
متن کاملFuzzy Identity-Based Encryption
We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy Identity-Based Encryption. In Fuzzy IBE we view an identity as set of descriptive attributes. A Fuzzy IBE scheme allows for a private key for an identity, ω, to decrypt a ciphertext encrypted with an identity, ω′, if and only if the identities ω and ω′ are close to each other as measured by the “set overlap” di...
متن کاملBiometric cryptosystems: authentication, encryption and signature for biometric identities
Zusammenfassung) Biometrics have been used for secure identification and authentication for more than two decades since biometric data is unique, non-transferable, unforgettable, and always with us. Recently, biometrics has pervaded other aspects of security applications that can be listed under the topic of “Biometric Cryptosystems”. Although the security of some of these systems is questionab...
متن کاملFuzzy retrieval of encrypted data by multi-purpose data-structures
The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...
متن کاملFull Security: Fuzzy Identity Based Encryption
At EUROCRYPT 2005, Sahai and Waters presented the Fuzzy Identity Based Encryption (Fuzzy-IBE) which could be used for biometrics and attribute-based encryption in the selective-identity model. When a secure Fuzzy-IBE scheme in the selective-identity model is transformed to full identity model it exist an exponential loss of security. In this paper, we use the CPA secure Gentry's IBE (exponent i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Security and Communication Networks
دوره 6 شماره
صفحات -
تاریخ انتشار 2013