Paper
14 March 2013 A biometric signcryption scheme without bilinear pairing
Mingwen Wang, Zhiyuan Ren, Jun Cai, Wentao Zheng
Author Affiliations +
Proceedings Volume 8768, International Conference on Graphic and Image Processing (ICGIP 2012); 87686J (2013) https://doi.org/10.1117/12.2002003
Event: 2012 International Conference on Graphic and Image Processing, 2012, Singapore, Singapore
Abstract
How to apply the entropy in biometrics into the encryption and remote authentication schemes to simplify the management of keys is a hot research area. Utilizing Dodis’s fuzzy extractor method and Liu’s original signcryption scheme, a biometric identity based signcryption scheme is proposed in this paper. The proposed scheme is more efficient than most of the previous proposed biometric signcryption schemes for that it does not need bilinear pairing computation and modular exponentiation computation which is time consuming largely. The analysis results show that under the CDH and DL hard problem assumption, the proposed scheme has the features of confidentiality and unforgeability simultaneously.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Mingwen Wang, Zhiyuan Ren, Jun Cai, and Wentao Zheng "A biometric signcryption scheme without bilinear pairing", Proc. SPIE 8768, International Conference on Graphic and Image Processing (ICGIP 2012), 87686J (14 March 2013); https://doi.org/10.1117/12.2002003
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Biometrics

Fuzzy logic

Cryptography

Distributed interactive simulations

Information security

Current controlled current source

Image processing

RELATED CONTENT

Signature scheme based on bilinear pairs
Proceedings of SPIE (March 20 2013)
Security analysis for fingerprint fuzzy vaults
Proceedings of SPIE (May 31 2013)
Documents from malicious terminals
Proceedings of SPIE (April 18 2003)
Biometric Encryption using image processing
Proceedings of SPIE (April 01 1998)
A palmprint-based cryptosystem using double encryption
Proceedings of SPIE (March 17 2008)

Back to Top