Two Efficient Constructions for Biometric-Based Signature in Identity-Based Setting Using Bilinear Pairings

It is always an attractive topic for researchers that biometric traits are used to represent the identities of users in identity-based cryptography due to their unique and inherent properties. Fuzzy identity-based signature (FIBS) and biometric identity-based signature (BIO-IBS) are both promising cryptographic primitives, where a signature generated with a private key of an identity can be verified by another identity if and only if the distance between these two identities is within a certain threshold. In this paper, we design two novel constructions for biometric-based signature in identity-based setting over elliptic curve groups, namely BioFIBS and Bio-IBS. The combination of elliptic curve cryptography (ECC) technique with biometric-based IBS integrates the advantages of both so that the proposed schemes are performed in a more efficient and practical manner for resource-constrained applications. This is confirmed by the comparison with the existing schemes in terms of computational and communicational efficiency. In addition, we prove that both our schemes satisfy the security requirements including correctness and unforgeability that is guaranteed in the random oracle model against the adaptively chosen message and identity attack under the computational Diffie-Hellman assumption.

[1]  Fuchun Guo,et al.  Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption , 2014, IEEE Transactions on Information Forensics and Security.

[2]  Brent Waters,et al.  Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[3]  Chun Ying,et al.  F2P-ABS: A Fast and Secure Attribute-Based Signature for Mobile Platforms , 2019, Secur. Commun. Networks.

[4]  Wenfen Liu,et al.  Forward and backward secure fuzzy encryption for data sharing in cloud computing , 2019, Soft Comput..

[5]  P. Vasudeva Reddy,et al.  Pairing Free Identity-Based Blind Signature Scheme with Message Recovery , 2017, Cryptogr..

[6]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[8]  Muhammad Khurram Khan,et al.  Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor , 2016, Secur. Commun. Networks.

[9]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[10]  Reihaneh Safavi-Naini,et al.  An Efficient Signature Scheme from Bilinear Pairings and Its Applications , 2004, Public Key Cryptography.

[11]  Zhiguang Qin,et al.  Analysis and improvement of a provable secure fuzzy identity-based signature scheme , 2014, Science China Information Sciences.

[12]  Neyire Deniz Sarier A New Biometric Identity Based Encryption Scheme , 2008, 2008 The 9th International Conference for Young Computer Scientists.

[13]  Antoine Joux,et al.  Separating Decision Diffie–Hellman from Computational Diffie–Hellman in Cryptographic Groups , 2003, Journal of Cryptology.

[14]  Changji Wang An Efficient Fuzzy Identity-Based Signature Scheme without Bilinear Pairings , 2014, 2014 Tenth International Conference on Computational Intelligence and Security.

[15]  Kefei Chen,et al.  Fuzzy certificateless signature , 2016, Secur. Commun. Networks.

[16]  Tibor Juhas The use of elliptic curves in cryptography , 2007 .

[17]  Kazuhiro Yokoyama,et al.  Elliptic curve cryptosystem , 2000 .

[18]  Changji Wang A provable secure fuzzy identity based signature scheme , 2011, Science China Information Sciences.

[19]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[20]  Xiaolei Dong,et al.  Fuzzy Identity Based Signature , 2008, IACR Cryptol. ePrint Arch..

[21]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[22]  Neyire Deniz Sarier Efficient biometric-based Encryption for fingerprints , 2016, 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST).

[23]  Yupu Hu,et al.  An Efficient Biometric Identity Based Signature Scheme , 2013, KSII Trans. Internet Inf. Syst..

[24]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.