Fuzzy Identity-Based Encryption

@article{Sahai2005FuzzyIE,
  title={Fuzzy Identity-Based Encryption},
  author={Amit Sahai and Brent Waters},
  journal={IACR Cryptol. ePrint Arch.},
  year={2005},
  volume={2004},
  pages={86}
}
We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy Identity-Based Encryption. In Fuzzy IBE we view an identity as set of descriptive attributes. A Fuzzy IBE scheme allows for a private key for an identity, ω, to decrypt a ciphertext encrypted with an identity, ω ′, if and only if the identities ω and ω ′ are close to each other as measured by the “set overlap” distance metric. A Fuzzy IBE scheme can be applied to enable encryption using biometric inputs as… Expand
A Chosen-Ciphertext Secure Fuzzy Identity-Based Proxy Re-Encryption Scheme
TLDR
The security model of a fuzzy identity-based proxy re-encryption scheme, in which an identity is viewed as a set of descriptive attributes, is formulated and its CCA security under the decisional bilinear Diffie-Hellman (DBDH) assumption in the random model is proved. Expand
New Fuzzy Identity-Based Encryption in the Standard Model
TLDR
A new fuzzy IBE scheme is proposed which achieves IND-FID-CCA2 security in the standard model with a tight reduction and the size of public parameters is independent of the number of attributes associated with an identity. Expand
Fuzzy Identity Based Signature
TLDR
Fuzzy identity based signature possesses similar error-tolerance property as fuzzy IBE that allows a user with the private key for identity ! to decrypt a ciphertext encrypted for identity 0 if and only if ! and ! 0 are within a certain distance judged by some metric. Expand
Security of a Biometric Identity-based Encryption Scheme
TLDR
This paper shows that the proposed constant-size Bio-IBE scheme is even not chosen-plaintext secure, and that user w using his secret key is able to decrypt any ciphertext encrypted under an identity w' even though w is not close to w'. Expand
Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption
TLDR
This paper shows how to generically and efficiently construct a distance-based encryption (DBE) from an inner product encryption (IPE) with reasonable size of private keys and ciphertexts and proposes a new IPE scheme with the shortest private key to build DBE. Expand
Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption
TLDR
This paper shows how to generically and efficiently construct a distance-based encryption (DBE) from an inner product encryption (IPE) with reasonable size of private keys and ciphertexts and proposes a new IPE scheme with the shortest private key to build DBE. Expand
Improvement on a Fuzzy Identity-based Encryption Scheme
TLDR
This paper gives more efficient fuzzy id-based encryption scheme from lattice, in which the public keys are greatly reduced, and there are two vectors corresponding to each bit of the identity by using of the algorithm Sampleleft, and only a trapdoor basis is the secret key. Expand
Fuzzy identity based signature with applications to biometric authentication
TLDR
It is proved that the fuzzy identity based signature scheme is existentially unforgeable against adaptively chosen message attack in the standard model and the applicability of the construction to secure biometric authentication is demonstrated. Expand
Efficient biometric identity-based encryption
TLDR
This paper proposes a provable-secure inner-product encryption (IPE) with short ciphertext and shows the IPE is indistinguishable against selective identity, adaptive chosen-plaintext attack (IND-sID-CPA), and constructs a distance-based encryption (DBE) leveraging the proposed IPE and proves that the DBE captures the same security with the underlying IPE. Expand
An Efficient and Flexible Scheme to Support Biometric-Based and Role-Based Access Control
TLDR
The proposed scheme requires only two pairings for decryption and enables system engineers to specify various threshold values for distinct sets of attributes, which is a practical cryptographic mechanism to support both biometric-based and role-based access control. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 22 REFERENCES
A fuzzy commitment scheme
TLDR
Because the fuzzy commitment scheme is tolerant of error, it is capable of protecting biometric data just as conventional cryptographic techniques, like hash functions, are used to protect alphanumeric passwords. Expand
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption
TLDR
This work presents a scalable forward-secure HIBE (fs-HIBE) scheme, which can be used for secure communications with entities having multiple roles in role-based access control and generalizes it into a collusion-resistant multiple hierarchical ID-based encryption scheme. Expand
Key-Privacy in Public-Key Encryption
TLDR
It is proved that the El Gamal scheme provides anonymity under chosen-plaintext attack assuming the Decision Diffie-Hellman problem is hard and that the Cramer-Shoup scheme providing anonymity under choosing-ciphertext attack under the same assumption. Expand
A Forward-Secure Public-Key Encryption Scheme
TLDR
The first constructions of (non-interactive) forward-secure public-key encryption schemes are presented and the main construction achieves security against chosen-plaintext attacks in the standard model, and all parameters are poly-logarithmic in the total number of time periods. Expand
Identity-Based Cryptosystems and Signature Schemes
TLDR
A novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other’s signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party. Expand
Identity-Based Encryption from the Weil Pairing
TLDR
This work proposes a fully functional identity-based encryption (IBE) scheme based on bilinear maps between groups and gives precise definitions for secure IBE schemes and gives several applications for such systems. Expand
Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles
TLDR
Two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model are constructed. Expand
Reusable cryptographic fuzzy extractors
TLDR
This work describes the conditions that fuzzy extractors need to satisfy to be secure, and presents generic constructions from ordinary building blocks, and demonstrates how to use a biometric secret in a remote fuzzy authentication protocol that does not require any storage on the client's side. Expand
Efficient Identity-Based Encryption Without Random Oracles
TLDR
This work first presents their IBE construction and reduces the security of the scheme to the decisional Bilinear Diffie-Hellman (BDH) problem, and shows that their techniques can be used to build a new signature scheme that is secure under the computational Diffie -Hellman assumption without random oracles. Expand
On enabling secure applications through off-line biometric identification
TLDR
This paper studies secure off-line authenticated user identification schemes based on a biometric system that can measure a user's biometrics accurately (up to some Hamming distance) and investigates a new technology which allows a users' biometric data to facilitate cryptographic mechanisms. Expand
...
1
2
3
...