메뉴 건너뛰기




Volumn 4, Issue 1, 2011, Pages 23-32

A new biometric identity based encryption scheme secure against DoS attacks

Author keywords

Biometrics; DoS attack; Fuzzy extraction; Fuzzy IBE

Indexed keywords

BIOMETRICS; CRYPTOGRAPHY; EFFICIENCY; SECURITY OF DATA;

EID: 79951803930     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.162     Document Type: Article
Times cited : (18)

References (22)
  • 1
    • 79951780574 scopus 로고    scopus 로고
    • A new biometric identity based encryption scheme. The 2008 International Symposium on Trusted Computing-TrustCom 2008, IEEE Computer Society
    • Sarier ND. A new biometric identity based encryption scheme. The 2008 International Symposium on Trusted Computing-TrustCom 2008, IEEE Computer Society, 2008.
    • (2008)
    • Sarier, N.D.1
  • 2
    • 34547325357 scopus 로고    scopus 로고
    • Secure attribute-based systems. ACM Conference on Computer and Communications Security
    • Pirretti M, Traynor P, McDaniel P, Waters B. Secure attribute-based systems. ACM Conference on Computer and Communications Security, 2006; 99-112.
    • (2006) , pp. 99-112
    • Pirretti, M.1    Traynor, P.2    McDaniel, P.3    Waters, B.4
  • 3
    • 24944554962 scopus 로고    scopus 로고
    • Advances in Cryptology-EUROCRYPT 2005, LNCS
    • Springer, Heidelberg
    • Sahai A, Waters B. Fuzzy identity-based encryption. Advances in Cryptology-EUROCRYPT 2005, LNCS, Vol. 3494. Springer, Heidelberg, 2005; 457-473.
    • (2005) Fuzzy identity-based encryption , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 4
    • 34748851940 scopus 로고    scopus 로고
    • New constructions of fuzzy identity-based encryption. ACM Symposium on Information, Computer and Communications Security-ASIACCS'07
    • Baek J, Susilo W, Zhou J. New constructions of fuzzy identity-based encryption. ACM Symposium on Information, Computer and Communications Security-ASIACCS'07, 2007; 368-370.
    • (2007) , pp. 368-370
    • Baek, J.1    Susilo, W.2    Zhou, J.3
  • 8
    • 79951803269 scopus 로고    scopus 로고
    • Fuzzy identity based signature. Cryptology ePrint Archive, Report 2008/002, Available at
    • Yang P, Cao Z, Dong X. Fuzzy identity based signature. Cryptology ePrint Archive, Report 2008/002, 2008. Available at.
    • (2008)
    • Yang, P.1    Cao, Z.2    Dong, X.3
  • 10
    • 84947617861 scopus 로고    scopus 로고
    • 6th European Workshop on Public Key Services, Applications and Infrastructures-EuroPKI'09
    • Springer, in press
    • Sarier ND. Biometric identity based signature revisited. 6th European Workshop on Public Key Services, Applications and Infrastructures-EuroPKI'09. Springer, in press.
    • Biometric identity based signature revisited
    • Sarier, N.D.1
  • 14
    • 48649088535 scopus 로고    scopus 로고
    • Multi-bits biometric string generation based on the likelyhood ratio. IEEE Conference on Biometrics: Theory, Applications and Systems, University of Notre Dame.
    • Chen C, Veldhuis RNJ, Kevenaar TAM, Akkermans AHM. Multi-bits biometric string generation based on the likelyhood ratio. IEEE Conference on Biometrics: Theory, Applications and Systems, University of Notre Dame, 2007; 1-6.
    • (2007) , pp. 1-6
    • Chen, C.1    Veldhuis, R.N.J.2    Kevenaar, T.A.M.3    Akkermans, A.H.M.4
  • 15
    • 79951790442 scopus 로고    scopus 로고
    • ID based cryptosystems with pairing on elliptic curve. Cryptology ePrint Archive, Report 2003/054
    • Sakai R, Kasahara M. ID based cryptosystems with pairing on elliptic curve. Cryptology ePrint Archive, Report 2003/054, 2003.
    • (2003)
    • Sakai, R.1    Kasahara, M.2
  • 16
    • 33845981472 scopus 로고    scopus 로고
    • On computable isomorphisms in efficient asymmetric pairing-based systems
    • Smart NP, Vercauteren F. On computable isomorphisms in efficient asymmetric pairing-based systems. Discrete Applied Mathematics 2007; 155(4): 538-547.
    • (2007) Discrete Applied Mathematics , vol.155 , Issue.4 , pp. 538-547
    • Smart, N.P.1    Vercauteren, F.2
  • 21
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Boneh D, Franklin MK. Identity-based encryption from the weil pairing. SIAM Journal on Computing 2003; 32(3): 586-615.
    • (2003) SIAM Journal on Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.K.2
  • 22
    • 79951787821 scopus 로고    scopus 로고
    • Implementation of algorithms from the paper fuzzy extractors: how to generate strong key from biometrics and other noisy data Available at
    • Harmon K, Reyzin L. Implementation of algorithms from the paper fuzzy extractors: how to generate strong key from biometrics and other noisy data 2009. Available at.
    • (2009)
    • Harmon, K.1    Reyzin, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.