Skip to main content
Log in

CCA2 secure biometric identity based encryption with constant-size ciphertext

  • Published:
Journal of Zhejiang University SCIENCE C Aims and scope Submit manuscript

Abstract

We propose a new biometric identity based encryption scheme (Bio-IBE), in which user biometric information is used to generate the public key with a fuzzy extractor. This is the first Bio-IBE scheme that achieves constant size ciphertext. This is also a scheme that is secure against the adaptive chosen ciphertext attack (CCA2). Details are presented along with a discussion of Shamir’s threshold secret sharing and fuzzy extraction of biometrics, which is based on error correction codes. We also define a security model and prove that the security of the proposed scheme is reduced to the decisional bilinear Diffie-Hellman (DBDH) assumption. The comparison shows that the proposed scheme has better efficiency and stronger security compared with the available Bio-IBE schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Baek, J., Susilo, W., Zhou, J.Y., 2007. New Constructions of Fuzzy Identity-Based Encryption. Proc. 2nd ACM Symp. on Information Computer and Communications Security, p.368–370. [doi:10.1145/1229285.1229330]

  • Boneh, D., Boyen, X., 2004. Efficient Selective-ID Secure Identity-Based Encryption without Random Oracles. Proc. EUROCRYPT, p.223–238.

  • Boneh, D., Franklin, M.K., 2001. Identity-Based Encryption from the Weil Pairing. Proc. CRYPTO, p.213–229.

  • Burnett, A., Byrne, F., Dowling, T., Duffy, A., 2007. A biometric identity based signature scheme. Int. J. Network Secur., 5(3):317–326.

    Google Scholar 

  • Cha, J.C, Cheon, J.H., 2003. An Identity-Based Signature from Gap Diffie-Hellman Groups. Proc. Public Key Cryptography, p.18–30.

  • Cheon, J.H., 2006. Security Analysis of the Strong Diffie-Hellman Problem. Proc. EUROCRYPT, p.1–11.

  • Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A., 2008. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput., 38(1):97–139. [doi:10.1137/060651380]

    Article  MathSciNet  MATH  Google Scholar 

  • Fang, L., Wang, J., Ren, Y., Xia, J., Bian, S., 2008. Chosen ciphertext secure fuzzy identity based encryption without ROM. J. Shanghai Jiao Tong Univ. (Sci.), 13(6):646–650. [doi:10.1007/s12204-008-0646-y]

    Article  Google Scholar 

  • Juels, A., Wattenberg, M., 1999. A Fuzzy Commitment Scheme. ACM Conf. on Computer and Communications Security, p.28–36.

  • Li, X.M., Yang, B., Guo, Y.B., 2009. Fuzzy Identity Based Encryption Scheme with Some Assigned Attributes. Proc. 5th Int. Conf. on Information Assurance and Security, p.133–136. [doi:10.1109/IAS.2009.145]

  • Ren, Y.L., Gu, D.W., Wang, S.Z., Zhang, X.P., 2010. New fuzzy identity-based encryption in the standard model. Informatica, 21(3):393–407.

    MathSciNet  MATH  Google Scholar 

  • Sahai, A., Waters, B., 2005. Fuzzy Identity-Based Encryption. Proc. EUROCRYPT, p.457–473.

  • Sarier, N.D., 2008. A New Biometric Identity Based Encryption Scheme. Proc. ICYCS, p.2061–2066.

  • Sarier, N.D., 2010. Generic Constructions of Biometric Identity Based Encryption Systems. Proc. WISTP, p.90–105.

  • Sarier, N.D., 2011. A new biometric identity based encryption scheme secure against DoS attacks. Secur. Commun. Networks, 4(1):23–32. [doi:10.1002/sec.162]

    Article  Google Scholar 

  • Shamir, A., 1984. Identity-Based Cryptosystems and Signature Schemes. Proc. Crypto, p.47–53.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yang Yang.

Additional information

Project supported by the National Basic Research Program (973) of China (No. 2007CB311201) and the National Natural Science Foundation of China (Nos. 60970119, 60803149, 60833008, and 61072067)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yang, Y., Hu, Yp., Zhang, Ly. et al. CCA2 secure biometric identity based encryption with constant-size ciphertext. J. Zhejiang Univ. - Sci. C 12, 819–827 (2011). https://doi.org/10.1631/jzus.C1000429

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1631/jzus.C1000429

Key words

CLC number

Navigation