Browse > Article
http://dx.doi.org/10.3837/tiis.2013.08.015

An Efficient Biometric Identity Based Signature Scheme  

Yang, Yang (College of Mathematics and Computer Science, Fuzhou University)
Hu, Yupu (Key Laboratory of Computer Networks and Information Security, Xidian University)
Zhang, Leyou (Key Laboratory of Computer Networks and Information Security, Xidian University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.7, no.8, 2013 , pp. 2010-2026 More about this Journal
Abstract
The combination of biometrics and cryptography gains a lot of attention from both academic and industry community. The noisy biometric measurement makes traditional identity based cryptosystems unusable. Also the extraction of key from biometric information is difficult. In this paper, we propose an efficient biometric identity based signature scheme (Bio-IBS) that makes use of fuzzy extractor to generate the key from a biometric data of user. The component fuzzy extraction is based on error correction code. We also prove that the security of suggested scheme is reduced to computational Diffie-Hellman (CDH) assumption instead of other strong assumptions. Meanwhile, the comparison with existing schemes shows that efficiency of the system is enhanced.
Keywords
Biometric; Identity Based; Signature; Provable Secure;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Sahai A, and Waters B, "Fuzzy identity-based encryption," in Proc. of 24th Annual Int. Conf. on the Theory and Applications of Cryptographic Techniques, vol. 3494, pp.457-473, May 22-26, 2005.
2 Kancharla PK, Gummadidala S, and Saxena A, "Identity based strong designated verifier signature scheme," Informatica, vol. 18, no. 2, pp. 239-252, 2007.
3 Burnett A, Byrne F, Dowling T, and Duffy A, "A biometric identity based signature scheme," International Journal of Network Security, vol. 5, no. 3, pp. 317-326, 2007.
4 Liu X, Miao Q, and Li D, "A new special biometric identity based signature scheme," International Journal of Security and its Applications, vol. 2, no.1, pp. 13-18, 2008.
5 Maltoni D, Maio D, Jain AK, and Prabhakar S, Handbook of Fingerprint Recognition, Springer Publishing Company, New York, 2009.
6 Sanjay K, Dijana P, and Bernadette D, "Obtaining cryptographic keys using feature level fusion of iris and face biometrics for secure user authentication," in Proc. of IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, pp. 138-145, June 13-18, 2010.
7 Rashid RA, Mahalin NH, Sarijari MA, "Security system using biometric technology: design and implementation of voice recognition systems," in Proc. of Int. Conf. on Computer and Communication Engineering, pp. 898-902, May 13-15, 2008.
8 Koelstra S, Pantic M, Dynamic A, "A dynamic texture-based approach to recognition of facial actions and their temporal models," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 32, no. 11, pp. 1-15, 2010.   DOI   ScienceOn
9 Huffman WC, Pless V, Fundamentals of error-correcting codes, Cambridge University Press, 2003.
10 Wang C, Wei C, Yang L. "A fuzzy identity based signature scheme," in Proc. of Int. Conf. on E-Business and Information System Security, pp. 1-5, October 17-19, 2009.
11 Y. Dodis, L. Reyzin, A. Smith. "Fuzzy extractors: how to generate strong keys from biometrics and other noisy data," SIAM Journal on Computing, vol. 38, no. 1, pp. 97-139, 2008.   DOI   ScienceOn
12 Juels A, Wattenberg M, "A fuzzy commitment scheme," in Proc. of the 6th ACM Conf. on Computer and Communications Security, pp. 28-36, November 1-4, 1999.
13 Yang P, Cao Z, and Dong X. "Fuzzy identity based signature." Available in Cryptology ePrint Archive.
14 Wang C, Kim JH, "Two constructions of fuzzy identity based signature," in Proc. of 2nd Int. Conf. on Biomedical Engineering and Informatics, pp. 1-5, October 17-19, 2009.
15 Liu J, Baek J, Susilo W, Zhou J, "Certificate-based signature schemes without pairings or random oracles," in Proc. of Information Security Conf., pp. 285-297, September 15-18, 2008.
16 Konig R, and Maurer U, "Generalized strong extractors and deterministic privacy amplification," in Proc. of Int. Workshop on Cryptography and Coding, vol. 3796, pp. 322-339, March 14-18, 2005.
17 Dodis Y, Elbaz A, Oliveira R, and Raz R, "Improved randomness extraction from two independent sources," in Proc. of Int. Workshop on Randomization and Approximation Techniques in Computer Science, pp 334-344, August 22-24, 2004.
18 Kanukurthi B, L. Reyzin, "An improved robust fuzzy extractor," in Proc. of 6th Conf. on Security and Cryptography for Networks, vol. 5229, pp. 156-171, September 10-12, 2008.
19 Yang B, Sun A, and Zhang W, "A Fuzzy Extractor Based on Smooth Entropy," in Proc. of 2nd Int. Conf. on Computer Science and its Applications, pp. 1-6, December 10-12, 2009.
20 Skoric B, Tuyls P, Guajardo J, and Preneel B, "An efficient fuzzy extractor for limited noise," Available in Cryptology ePrint Archive.
21 Yang B, Sun A, and Zhang W, "A fully robust fuzzy extractor," in Proc. of IEEE Int. Conf. on Network Infrastructure and Digital Content, pp. 552-556, October 10-11, 2009.
22 Ong TS, "Fuzzy key extraction from fingerprint biometrics based on dynamic quantization mechanism," in Proc. of Third Int. Symposium on Information Assurance and Security, pp. 71-76, August 29-31, 2007.
23 Buhan I, Doumen J, Hartel P, and Veldhuis R, "Constructing practical fuzzy extractors using QIM," Tech. Rep. TR-CTIT-07-52, Centre for Telematics and Information Technology, University of Twente, 2007.
24 Sun X, Li J, Yin H, and Chen G, "Delegatability of an identity based strong designated verifier signature scheme," Informatica, vol. 21, no. 1, pp. 117-122, 2010.
25 Li J, Huang X, Mu Y, Susilo W, Wu Q, "Certificate-based signature: security model and efficient construction." in Proc. of European Public Key Infrastructure Workshop, vol. 4582, pp. 110-125, June 28-30, 2007.
26 Tang Q, Bringer J, Chabanne H, and Pointcheval D, "A formal study of the privacy concerns in biometric-based remote authentication schemes," in Proc. of 4th Int. Conf. on Information Security Practice and Experience, vol. 4991, pp. 56-70, April 21-23, 2008.
27 Uludag U, "Biometric cryptosystems: issues and challenges," Proceedings of the IEEE, vol. 92, no. 6, pp. 948-960, 2004.
28 Boneh D, and Boyen X, "Secure identity based encryption without random oracles," in Proc. of 24th Annual Int. Cryptology Conf., vol. 3152, pp. 443-459, August 15-19, 2004.
29 Skoric B, "Security with Noisy Data II," in Proc. of Int. Conf. on Information Hiding, pp. 101-112, May 15-18, 2007.
30 Skoric B, "Security with Noisy Data I," in Proc. of Int. Conf. on Information Hiding, pp. 79-99, May 15-18, 2007.
31 Álvarez FH, and Encinas LH, "Biometric fuzzy extractor scheme for iris templates," in Proc. of the 2009 World Congress in Computer Science, Computer Engineering, and Applied Computing, pp. 563-569, July 13-16, 2009.
32 Arakala A, Jeffers J, and Horadam K, "Fuzzy extractors for minutiae-based fingerprint authentication," in Proc. of Advances in Biometrics, vol. 4642, pp. 760-769, August 27-29, 2007.
33 Li Q, Guo M, and Chang E, "Fuzzy extractors for asymmetric biometric representations," in Proc. of IEEE Conf. on Computer Vision and Pattern Recognition Workshops, pp. 1-6, June 23-28, 2008.
34 Sutcu Y, Li Q, and Memon N, "Design and analysis of fuzzy extractors for faces," in Proc. of the SPIE Optics and Photonics in Global Homeland Security V and Biometric Technology for Human Identification VI, vol. 7306, pp. 71-76, April 13-16, 2009.