Skip to main content

Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model

  • Conference paper
Intelligence and Security Informatics (PAISI 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6122))

Included in the following conference series:

Abstract

A new cryptographic primitive, called fuzzy biometric signcryption scheme which can perform confidentiality and authentication in a logic step while the sender and receiver identities are based on the fuzzy biometric string, is proposed. The proposed scheme possesses the error-tolerance property that allows a user with the private key for fuzzy biometric string b to decrypt a message for string b′ if and only if b and b′ are within a distance t. After given the scheme model and security definitions, a fuzzy biometric signcryption scheme in the standard model is proposed and then then security are analyzed including indistinguishable against adaptively chosen ciphertext attack and existentially unforgeable against adaptively chosen message attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Boneh, D., Boyen, X.: Short signatures without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56–73. Springer, Heidelberg (2004)

    Google Scholar 

  2. Boneh, D., Boyen, X.: Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups. Journal of Cryptology 21, 149–177 (2008)

    Article  MATH  MathSciNet  Google Scholar 

  3. Boneh, D., Boyen, X.: Efficient selective-id secure identity based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223–238. Springer, Heidelberg (2004)

    Google Scholar 

  4. Boneh, D., Boyen, X.: Secure identity based encryption without random oracles. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 443–459. Springer, Heidelberg (2004)

    Google Scholar 

  5. Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114–127. Springer, Heidelberg (2005)

    Google Scholar 

  6. Gentry, C.: Practical identity-based encryption without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 445–464. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  7. Tan, C.H.: A new signature scheme without random oracles. International Journal of Security and Networks 1(3-4), 237–242 (2006)

    Article  Google Scholar 

  8. Ren, Y., Gu, D.: Fully CCA2 secure identity based broadcast encryption without random oracles. Information Processing Letters 109, 527–533 (2009)

    Article  MathSciNet  Google Scholar 

  9. Yu, Y., Yang, B., Sun, Y., Zhu, S.: Identity based signcryption scheme without random oracles. Computer Standards & Interfaces 31(1), 56–62 (2009)

    Article  Google Scholar 

  10. Liu, Z., Hu, Y., Zhang, X., Ma, H.: Certificateless signcryption scheme in the standard model. Information Sciences 180(3), 452–464 (2010)

    Article  MATH  Google Scholar 

  11. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  12. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)

    Google Scholar 

  13. Yang, P., Cao, Z., Dong, X.: Fuzzy identity based signature, http://eprint.iacr.org/2008/002.pdf

  14. Beak, J., Susilo, W., Zhou, J.: New construction of fuzzy identity-based encryption. In: ASIACCS’07, pp. 368–370. ACM, New York (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, M., Yang, B., Takagi, T., Shen, Y., Zhang, W. (2010). Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model. In: Chen, H., Chau, M., Li, Sh., Urs, S., Srinivasa, S., Wang, G.A. (eds) Intelligence and Security Informatics. PAISI 2010. Lecture Notes in Computer Science, vol 6122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13601-6_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13601-6_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13600-9

  • Online ISBN: 978-3-642-13601-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics