Skip to main content
Log in

Analysis and improvement of a provable secure fuzzy identity-based signature scheme

  • Research Paper
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

To enjoy the property of error tolerance in the biometric identities extraction, the fuzzy identitybased signature has been initialized to issue a signature on behalf of a descriptive attributes set ω instead of a single string. Any attributes set ω′ can be used to verify the validity of the signature in case the distance between ω and ω′ is less than a pre-defined threshold. Recently, Wang re-formalized the notion of fuzzy identitybased signature and proposed a concrete pairing-based construction along with the efficiency analysis and formal security proof. Unfortunately, by giving concrete attack, we indicate that Wang’s scheme is not secure against forgery attack. We also present an improved scheme to prevent this attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Tian H B, Zhang F G, Chen X F, et al. Selectively unforgeable but existentially forgeable signature schemes and applications. Sci China Inf Sci, 2013, 56: 012107

    Google Scholar 

  2. Shi J J, Shi R H, Guo Y, et al. Batch proxy quantum blind signature scheme. Sci China Inf Sci, 2013, 56: 052115

    MathSciNet  Google Scholar 

  3. Wang F H, Hu Y P, Wang B C. Lattice-based linearly homomorphic signature scheme over binary field. Sci China Inf Sci, 2013, 56: 112108

    MathSciNet  Google Scholar 

  4. Diffie W, Hellman M E. New directions in cryptography. IEEE Trans Inf Theory, 1976, IT-22: 644–654

    Article  MathSciNet  Google Scholar 

  5. Shamir A. Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO 1984, LNCS 196. Berlin: Springer-Verlag, 1985. 47–53

    Google Scholar 

  6. Hess F. Efficient identity based signature schemes based on pairings. In: Proceedings of the 9th Annual International Workshop on Selected Areas in Cryptography, LNCS 2595. Berlin: Springer-Verlag, 2003. 310–324

    Chapter  Google Scholar 

  7. Xing D S, Cao Z F, Dong X L. Identity based signature scheme based on cubic residues. Sci China Inf Sci, 2011, 54: 2001–2012

    Article  MATH  MathSciNet  Google Scholar 

  8. Chai Z C, Cao Z F, Dong X L. Identity-based signature scheme based on quadratic residues. Sci China Inf Sci, 2007, 50: 373–380

    MATH  MathSciNet  Google Scholar 

  9. Sahai A, Waters B. Fuzzy identity-based encryption. In: Proceedings of EUROCRYPT 2005, LNCS 3494. Berlin: Springer-Verlag, 2005. 457–473

    Chapter  Google Scholar 

  10. Yang P Y, Cao Z F, Dong X L. Fuzzy identity based signature with applications to biometric authentication. Comput Electr Eng, 2011, 37: 532–540

    Article  MATH  Google Scholar 

  11. Wang C J. A provable secure fuzzy identity based signature scheme. Sci China Inf Sci, 2012, 55: 2139–2148

    Article  MATH  MathSciNet  Google Scholar 

  12. Shamir A. How to share a secret. Commun ACM, 1979, 22: 612–613

    Article  MATH  MathSciNet  Google Scholar 

  13. Baek J, Zheng Y. Identity-based threshold decryption. In: Proceedings of PKC 2004, LNCS 2947. Berlin: Springer-Verlag, 2004. 262–276

    Google Scholar 

  14. Baek J, Zheng Y. Identity-based threshold signature scheme from the bilinear pairings. In: Proceedings of IEEE Int Conf Information Technology: Coding and Computing (ITCC’ 04), Las Vegas, 2004. 124–128

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hu Xiong.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xiong, H., Chen, Y., Zhu, G. et al. Analysis and improvement of a provable secure fuzzy identity-based signature scheme. Sci. China Inf. Sci. 57, 1–5 (2014). https://doi.org/10.1007/s11432-014-5152-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-014-5152-2

Keywords

Navigation