Two Constructions of Fuzzy Identity Based Signature
Sahai and Waters first introduced the notion of fuzzy identity based encryption (Fuzzy IBE) in 2005, which can be applied to enable encryption using biometric inputs as identities. Later, Yang et al. introduced the concept of fuzzy identity based signature (Fuzzy IBS) in 2008, and constructed a Fuzz...
Saved in:
Published in | 2009 2nd International Conference on Biomedical Engineering and Informatics pp. 1 - 5 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.10.2009
|
Subjects | |
Online Access | Get full text |
ISBN | 9781424441327 1424441323 |
ISSN | 1948-2914 |
DOI | 10.1109/BMEI.2009.5305820 |
Cover
Summary: | Sahai and Waters first introduced the notion of fuzzy identity based encryption (Fuzzy IBE) in 2005, which can be applied to enable encryption using biometric inputs as identities. Later, Yang et al. introduced the concept of fuzzy identity based signature (Fuzzy IBS) in 2008, and constructed a Fuzzy IBS scheme based on Sahai and Waters's Fuzzy IBE scheme. In this paper, we further formalize the notion and security model of Fuzzy IBS scheme and present two new constructions of Fuzzy IBS scheme. The first Fuzzy IBS scheme follows a certification approach based on standard signatures and its security is the same as that of underlying standard signature scheme. The second Fuzzy IBS scheme is a transformation from convertible identification schemes in the random oracle model and it is proved to be existentially unforgeable under a chosen message attack and Fuzzy identity attack in the random oracle model assuming the Discrete Logarithm problem is computationally hard. |
---|---|
ISBN: | 9781424441327 1424441323 |
ISSN: | 1948-2914 |
DOI: | 10.1109/BMEI.2009.5305820 |