A Novel Fuzzy Identity-Based Signature with Dynamic Threshold

The fuzzy identity-based signature allows a user with the private key for identity W to verify a signature signed by identity S if and only if W and S are within a certain distance judged by a threshold t. In previous fuzzy identity-based signature schemes, the threshold t is static and cannot be changed according to dynamic environment. This paper proposes a novel FISAT scheme(fuzzy identity-based signature with dynamic threshold), which is based on the bilinear maps and multi-sequence of Diffie-Hellman exponents assumption. The threshold in FISAT can be dynamically selected according to the importance of the message. Furthermore, FISAT only uses constant keys and ciphertext, which improves transmission performance.

[1]  David Pointcheval,et al.  Dynamic Threshold Public-Key Encryption , 2008, CRYPTO.

[2]  David Pointcheval,et al.  Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys , 2007, Pairing.

[3]  Jin Li,et al.  Attribute-Based Ring Signatures , 2008, IACR Cryptol. ePrint Arch..

[4]  C. Pandu Rangan,et al.  Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-Hoc Networks , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.

[5]  Jianhua Li,et al.  Identity-Based Directed Signature Scheme from Bilinear Pairings , 2008, IACR Cryptol. ePrint Arch..

[6]  Antoine Joux,et al.  Separating Decision Diffie–Hellman from Computational Diffie–Hellman in Cryptographic Groups , 2003, Journal of Cryptology.

[7]  Manoj Prabhakaran,et al.  Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance , 2008, IACR Cryptol. ePrint Arch..

[8]  Dan Boneh,et al.  Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.

[9]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[10]  Dalia Khader,et al.  Attribute Based Group Signatures , 2007, IACR Cryptol. ePrint Arch..

[11]  Xiaolei Dong,et al.  Fuzzy Identity Based Signature , 2008, IACR Cryptol. ePrint Arch..

[12]  Atsuko Miyaji,et al.  Characterization of Elliptic Curve Traces under FR-Reduction , 2000, ICISC.

[13]  Yuqing Zhang,et al.  An Efficient Identity-based Ring Signcryption Scheme , 2008, IACR Cryptol. ePrint Arch..

[14]  Antoine Joux,et al.  A One Round Protocol for Tripartite Diffie–Hellman , 2000, Journal of Cryptology.

[15]  Girraj Kumar Verma,et al.  New ID-based Fair Blind Signatures , 2008, IACR Cryptol. ePrint Arch..