Fuzzy certificateless signature. Issue 16 (9th August 2016)
- Record Type:
- Journal Article
- Title:
- Fuzzy certificateless signature. Issue 16 (9th August 2016)
- Main Title:
- Fuzzy certificateless signature
- Authors:
- Wang, Liangliang
Lai, Junzuo
Xiong, Hu
Chen, Kefei
Long, Yu - Abstract:
- Abstract: According to the inspirations from history, we introduce a new cryptography primitive called fuzzy certificateless signature, which not only eliminates the key escrow problem inherently existed in fuzzy identity‐based signature but also possesses the error tolerance property of fuzzy identity‐based signature that allows for a set of attributes ω to verify a signature produced with a private key for an identity ω ′ if and only if the distance between the two identities ω and ω ′ is within a certain threshold. In this paper, the concept of fuzzy certificateless signature is first proposed, and then, the syntax and security model of fuzzy certificateless signature are formally defined. In the next step, so far, the first concrete fuzzy certificateless signature scheme is proposed, which may be practicably implemented in biometric identification. In addition, a formal security proof is provided, so as to demonstrate that in the random oracle model, our newly proposed scheme is existentially unforgeable against Types I and II chosen message attacks formalized in the security model under the computational Diffie–Hellman assumption. Copyright © 2016 John Wiley & Sons, Ltd. Abstract : In this paper, the concept of fuzzy certificateless signature is proposed and then the syntax and security model of fuzzy certificateless signature are formally defined. In the next step, so far, the first concrete fuzzy certificateless signature scheme is proposed, which may be practicablyAbstract: According to the inspirations from history, we introduce a new cryptography primitive called fuzzy certificateless signature, which not only eliminates the key escrow problem inherently existed in fuzzy identity‐based signature but also possesses the error tolerance property of fuzzy identity‐based signature that allows for a set of attributes ω to verify a signature produced with a private key for an identity ω ′ if and only if the distance between the two identities ω and ω ′ is within a certain threshold. In this paper, the concept of fuzzy certificateless signature is first proposed, and then, the syntax and security model of fuzzy certificateless signature are formally defined. In the next step, so far, the first concrete fuzzy certificateless signature scheme is proposed, which may be practicably implemented in biometric identification. In addition, a formal security proof is provided, so as to demonstrate that in the random oracle model, our newly proposed scheme is existentially unforgeable against Types I and II chosen message attacks formalized in the security model under the computational Diffie–Hellman assumption. Copyright © 2016 John Wiley & Sons, Ltd. Abstract : In this paper, the concept of fuzzy certificateless signature is proposed and then the syntax and security model of fuzzy certificateless signature are formally defined. In the next step, so far, the first concrete fuzzy certificateless signature scheme is proposed, which may be practicably implemented in biometric identification. In addition, a formal security proof is provided, so as to demonstrate that in the random oracle model, our newly proposed scheme is existentially unforgeable under the computational Diffie Hellman assumption. … (more)
- Is Part Of:
- Security and communication networks. Volume 9:Issue 16(2016)
- Journal:
- Security and communication networks
- Issue:
- Volume 9:Issue 16(2016)
- Issue Display:
- Volume 9, Issue 16 (2016)
- Year:
- 2016
- Volume:
- 9
- Issue:
- 16
- Issue Sort Value:
- 2016-0009-0016-0000
- Page Start:
- 3658
- Page End:
- 3669
- Publication Date:
- 2016-08-09
- Subjects:
- certificateless public key cryptography -- fuzzy identity‐based signature -- computational Diffie–Hellman assumption -- fuzzy certificateless signature -- random oracle model
Computer networks -- Security measures -- Periodicals
Computer security -- Periodicals
Cryptography -- Periodicals
005.805 - Journal URLs:
- http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1939-0122 ↗
https://www.hindawi.com/journals/scn/ ↗
http://onlinelibrary.wiley.com/ ↗ - DOI:
- 10.1002/sec.1572 ↗
- Languages:
- English
- ISSNs:
- 1939-0114
- Deposit Type:
- Legaldeposit
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD Digital store
- Ingest File:
- 48.xml