J4

• Articles • Previous Articles     Next Articles

Two biometric identities based signature schemes

LIU Xiao-dong, JIANG Ya-li, LI Da-xing   

  1. Institute of Network Security, Shandong University, Jinan 250100, Shandong, China
  • Received:1900-01-01 Revised:1900-01-01 Online:2006-10-24 Published:2006-10-24
  • Contact: LIU Xiao-dong

Abstract: In the first scheme, the signer's public key was constructed from his biometric data. The verifier performed verification successfully by asking signer to show his biometric data, which makes the verifying operation more visible and convenient. In the second scheme, since the private key of the signer was constructed from the biometric data of the signer, it does not need to be placed in hardware, and therefore there is no worry about the loss and inconvenience caused by the fault of the hardware. These two schemes were constructed from the fuzzy extractor method proposed by Dodis, Liu scheme and classical BLS short signature scheme. Finally, two possible attacks on the schemes mentioned above were described and the ways to combat them were suggested.

Key words: BLS short signature scheme , Diffie-Hellman suppose, bilinear pairing, fuzzy extractor algorithm, identity based signature

CLC Number: 

  • TP309
[1] . Cryptanalysis and improvement of two kind of certificateless aggregate signature schemes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(7): 107-114.
[2] ZHU Bin-rui, QIN Jing, HAN Fei. Searchable encryption scheme based on biometrics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(5): 78-86.
[3] NONG Qiang, HUANG Zhen-jie, HUANG Ru-fen. Improvement of a certificateless aggregate signature scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(11): 52-59.
[4] FAN Ai-wan, XIA Dong-liang, YANG Zhao-feng. Security analysis and improvement of two certificateless aggregate signature schemes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(09): 42-48.
[5] HOU Hong-xia1,2, ZHANG Xue-feng2, DONG Xiao-li2. Improved certificateless aggregate signature scheme [J]. J4, 2013, 48(09): 29-34.
[6] ZHANG Fang-guo. Elliptic curves in cryptography: past, present and future… [J]. J4, 2013, 48(05): 1-13.
[7] WU Lei 1, KONG Fanyu 2. An efficient IDbased proxy ring signature scheme [J]. J4, 2009, 44(1): 40-43 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!