DOI QR코드

DOI QR Code

An Efficient Biometric Identity Based Signature Scheme

  • Yang, Yang (College of Mathematics and Computer Science, Fuzhou University) ;
  • Hu, Yupu (Key Laboratory of Computer Networks and Information Security, Xidian University) ;
  • Zhang, Leyou (Key Laboratory of Computer Networks and Information Security, Xidian University)
  • Received : 2012.04.23
  • Accepted : 2013.12.02
  • Published : 2013.08.31

Abstract

The combination of biometrics and cryptography gains a lot of attention from both academic and industry community. The noisy biometric measurement makes traditional identity based cryptosystems unusable. Also the extraction of key from biometric information is difficult. In this paper, we propose an efficient biometric identity based signature scheme (Bio-IBS) that makes use of fuzzy extractor to generate the key from a biometric data of user. The component fuzzy extraction is based on error correction code. We also prove that the security of suggested scheme is reduced to computational Diffie-Hellman (CDH) assumption instead of other strong assumptions. Meanwhile, the comparison with existing schemes shows that efficiency of the system is enhanced.

Keywords

References

  1. Tang Q, Bringer J, Chabanne H, and Pointcheval D, "A formal study of the privacy concerns in biometric-based remote authentication schemes," in Proc. of 4th Int. Conf. on Information Security Practice and Experience, vol. 4991, pp. 56-70, April 21-23, 2008.
  2. Uludag U, "Biometric cryptosystems: issues and challenges," Proceedings of the IEEE, vol. 92, no. 6, pp. 948-960, 2004.
  3. Boneh D, and Boyen X, "Secure identity based encryption without random oracles," in Proc. of 24th Annual Int. Cryptology Conf., vol. 3152, pp. 443-459, August 15-19, 2004.
  4. Sahai A, and Waters B, "Fuzzy identity-based encryption," in Proc. of 24th Annual Int. Conf. on the Theory and Applications of Cryptographic Techniques, vol. 3494, pp.457-473, May 22-26, 2005.
  5. Kancharla PK, Gummadidala S, and Saxena A, "Identity based strong designated verifier signature scheme," Informatica, vol. 18, no. 2, pp. 239-252, 2007.
  6. Sun X, Li J, Yin H, and Chen G, "Delegatability of an identity based strong designated verifier signature scheme," Informatica, vol. 21, no. 1, pp. 117-122, 2010.
  7. Burnett A, Byrne F, Dowling T, and Duffy A, "A biometric identity based signature scheme," International Journal of Network Security, vol. 5, no. 3, pp. 317-326, 2007.
  8. Liu X, Miao Q, and Li D, "A new special biometric identity based signature scheme," International Journal of Security and its Applications, vol. 2, no.1, pp. 13-18, 2008.
  9. Maltoni D, Maio D, Jain AK, and Prabhakar S, Handbook of Fingerprint Recognition, Springer Publishing Company, New York, 2009.
  10. Sanjay K, Dijana P, and Bernadette D, "Obtaining cryptographic keys using feature level fusion of iris and face biometrics for secure user authentication," in Proc. of IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, pp. 138-145, June 13-18, 2010.
  11. Rashid RA, Mahalin NH, Sarijari MA, "Security system using biometric technology: design and implementation of voice recognition systems," in Proc. of Int. Conf. on Computer and Communication Engineering, pp. 898-902, May 13-15, 2008.
  12. Koelstra S, Pantic M, Dynamic A, "A dynamic texture-based approach to recognition of facial actions and their temporal models," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 32, no. 11, pp. 1-15, 2010. https://doi.org/10.1109/TPAMI.2010.8
  13. Huffman WC, Pless V, Fundamentals of error-correcting codes, Cambridge University Press, 2003.
  14. Y. Dodis, L. Reyzin, A. Smith. "Fuzzy extractors: how to generate strong keys from biometrics and other noisy data," SIAM Journal on Computing, vol. 38, no. 1, pp. 97-139, 2008. https://doi.org/10.1137/060651380
  15. Juels A, Wattenberg M, "A fuzzy commitment scheme," in Proc. of the 6th ACM Conf. on Computer and Communications Security, pp. 28-36, November 1-4, 1999.
  16. Yang P, Cao Z, and Dong X. "Fuzzy identity based signature." Available in Cryptology ePrint Archive.
  17. Wang C, Wei C, Yang L. "A fuzzy identity based signature scheme," in Proc. of Int. Conf. on E-Business and Information System Security, pp. 1-5, October 17-19, 2009.
  18. Wang C, Kim JH, "Two constructions of fuzzy identity based signature," in Proc. of 2nd Int. Conf. on Biomedical Engineering and Informatics, pp. 1-5, October 17-19, 2009.
  19. Liu J, Baek J, Susilo W, Zhou J, "Certificate-based signature schemes without pairings or random oracles," in Proc. of Information Security Conf., pp. 285-297, September 15-18, 2008.
  20. Konig R, and Maurer U, "Generalized strong extractors and deterministic privacy amplification," in Proc. of Int. Workshop on Cryptography and Coding, vol. 3796, pp. 322-339, March 14-18, 2005.
  21. Dodis Y, Elbaz A, Oliveira R, and Raz R, "Improved randomness extraction from two independent sources," in Proc. of Int. Workshop on Randomization and Approximation Techniques in Computer Science, pp 334-344, August 22-24, 2004.
  22. Kanukurthi B, L. Reyzin, "An improved robust fuzzy extractor," in Proc. of 6th Conf. on Security and Cryptography for Networks, vol. 5229, pp. 156-171, September 10-12, 2008.
  23. Yang B, Sun A, and Zhang W, "A Fuzzy Extractor Based on Smooth Entropy," in Proc. of 2nd Int. Conf. on Computer Science and its Applications, pp. 1-6, December 10-12, 2009.
  24. Skoric B, Tuyls P, Guajardo J, and Preneel B, "An efficient fuzzy extractor for limited noise," Available in Cryptology ePrint Archive.
  25. Yang B, Sun A, and Zhang W, "A fully robust fuzzy extractor," in Proc. of IEEE Int. Conf. on Network Infrastructure and Digital Content, pp. 552-556, October 10-11, 2009.
  26. Buhan I, Doumen J, Hartel P, and Veldhuis R, "Constructing practical fuzzy extractors using QIM," Tech. Rep. TR-CTIT-07-52, Centre for Telematics and Information Technology, University of Twente, 2007.
  27. Skoric B, "Security with Noisy Data I," in Proc. of Int. Conf. on Information Hiding, pp. 79-99, May 15-18, 2007.
  28. Skoric B, "Security with Noisy Data II," in Proc. of Int. Conf. on Information Hiding, pp. 101-112, May 15-18, 2007.
  29. Ong TS, "Fuzzy key extraction from fingerprint biometrics based on dynamic quantization mechanism," in Proc. of Third Int. Symposium on Information Assurance and Security, pp. 71-76, August 29-31, 2007.
  30. Álvarez FH, and Encinas LH, "Biometric fuzzy extractor scheme for iris templates," in Proc. of the 2009 World Congress in Computer Science, Computer Engineering, and Applied Computing, pp. 563-569, July 13-16, 2009.
  31. Arakala A, Jeffers J, and Horadam K, "Fuzzy extractors for minutiae-based fingerprint authentication," in Proc. of Advances in Biometrics, vol. 4642, pp. 760-769, August 27-29, 2007.
  32. Li Q, Guo M, and Chang E, "Fuzzy extractors for asymmetric biometric representations," in Proc. of IEEE Conf. on Computer Vision and Pattern Recognition Workshops, pp. 1-6, June 23-28, 2008.
  33. Sutcu Y, Li Q, and Memon N, "Design and analysis of fuzzy extractors for faces," in Proc. of the SPIE Optics and Photonics in Global Homeland Security V and Biometric Technology for Human Identification VI, vol. 7306, pp. 71-76, April 13-16, 2009.
  34. Li J, Huang X, Mu Y, Susilo W, Wu Q, "Certificate-based signature: security model and efficient construction." in Proc. of European Public Key Infrastructure Workshop, vol. 4582, pp. 110-125, June 28-30, 2007.

Cited by

  1. Multibiometrics fusion using $Acz{\acute{e}}l$-Alsina triangular norm vol.8, pp.7, 2013, https://doi.org/10.3837/tiis.2014.07.012