Argument on biometrics identity-based encryption schemes

Syh Yuan Tan, Zhe Jin, Beng Jin Teoh

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

Recently, a few biometric identity-based encryption (BIO-IBE) schemes have been proposed. BIO-IBE leverages both fuzzy extractor and Lagrange polynomial to extract biometric feature as a user public key and as a preventive measure of collusion attack, respectively. In this paper, we reveal that BIO-IBE is not realistic whereby a query of fresh biometrics is needed for each encryption process. Moreover, the use of both fuzzy extractor and Lagrange polynomial in BIO-IBE simultaneously is a redundancy; it confers no advantage, but simply computational overhead. Therefore, we amend the progression of the BIO-IBE scheme by eliminating either Lagrange polynomial or fuzzy extractor to alleviate computational complexity. Subsequently, we demonstrate that the amendment does not compromise the security of the BIO-IBE scheme. Such amendments can be applied to other BIO-IBE schemes as well.

Original languageEnglish
Pages (from-to)1344-1352
Number of pages9
JournalSecurity and Communication Networks
Volume6
Issue number11
DOIs
Publication statusPublished - 2013 Jan 1

Fingerprint

Biometrics
Cryptography
Polynomials
Redundancy
Computational complexity

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Computer Networks and Communications

Cite this

Tan, Syh Yuan ; Jin, Zhe ; Teoh, Beng Jin. / Argument on biometrics identity-based encryption schemes. In: Security and Communication Networks. 2013 ; Vol. 6, No. 11. pp. 1344-1352.
@article{449fd71ab55644d89381bca21a42cd34,
title = "Argument on biometrics identity-based encryption schemes",
abstract = "Recently, a few biometric identity-based encryption (BIO-IBE) schemes have been proposed. BIO-IBE leverages both fuzzy extractor and Lagrange polynomial to extract biometric feature as a user public key and as a preventive measure of collusion attack, respectively. In this paper, we reveal that BIO-IBE is not realistic whereby a query of fresh biometrics is needed for each encryption process. Moreover, the use of both fuzzy extractor and Lagrange polynomial in BIO-IBE simultaneously is a redundancy; it confers no advantage, but simply computational overhead. Therefore, we amend the progression of the BIO-IBE scheme by eliminating either Lagrange polynomial or fuzzy extractor to alleviate computational complexity. Subsequently, we demonstrate that the amendment does not compromise the security of the BIO-IBE scheme. Such amendments can be applied to other BIO-IBE schemes as well.",
author = "Tan, {Syh Yuan} and Zhe Jin and Teoh, {Beng Jin}",
year = "2013",
month = "1",
day = "1",
doi = "10.1002/sec.716",
language = "English",
volume = "6",
pages = "1344--1352",
journal = "Security and Communication Networks",
issn = "1939-0114",
publisher = "John Wiley and Sons Inc.",
number = "11",

}

Argument on biometrics identity-based encryption schemes. / Tan, Syh Yuan; Jin, Zhe; Teoh, Beng Jin.

In: Security and Communication Networks, Vol. 6, No. 11, 01.01.2013, p. 1344-1352.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Argument on biometrics identity-based encryption schemes

AU - Tan, Syh Yuan

AU - Jin, Zhe

AU - Teoh, Beng Jin

PY - 2013/1/1

Y1 - 2013/1/1

N2 - Recently, a few biometric identity-based encryption (BIO-IBE) schemes have been proposed. BIO-IBE leverages both fuzzy extractor and Lagrange polynomial to extract biometric feature as a user public key and as a preventive measure of collusion attack, respectively. In this paper, we reveal that BIO-IBE is not realistic whereby a query of fresh biometrics is needed for each encryption process. Moreover, the use of both fuzzy extractor and Lagrange polynomial in BIO-IBE simultaneously is a redundancy; it confers no advantage, but simply computational overhead. Therefore, we amend the progression of the BIO-IBE scheme by eliminating either Lagrange polynomial or fuzzy extractor to alleviate computational complexity. Subsequently, we demonstrate that the amendment does not compromise the security of the BIO-IBE scheme. Such amendments can be applied to other BIO-IBE schemes as well.

AB - Recently, a few biometric identity-based encryption (BIO-IBE) schemes have been proposed. BIO-IBE leverages both fuzzy extractor and Lagrange polynomial to extract biometric feature as a user public key and as a preventive measure of collusion attack, respectively. In this paper, we reveal that BIO-IBE is not realistic whereby a query of fresh biometrics is needed for each encryption process. Moreover, the use of both fuzzy extractor and Lagrange polynomial in BIO-IBE simultaneously is a redundancy; it confers no advantage, but simply computational overhead. Therefore, we amend the progression of the BIO-IBE scheme by eliminating either Lagrange polynomial or fuzzy extractor to alleviate computational complexity. Subsequently, we demonstrate that the amendment does not compromise the security of the BIO-IBE scheme. Such amendments can be applied to other BIO-IBE schemes as well.

UR - http://www.scopus.com/inward/record.url?scp=84886309453&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84886309453&partnerID=8YFLogxK

U2 - 10.1002/sec.716

DO - 10.1002/sec.716

M3 - Article

VL - 6

SP - 1344

EP - 1352

JO - Security and Communication Networks

JF - Security and Communication Networks

SN - 1939-0114

IS - 11

ER -