A Biometric Identity Based Signature Scheme with Convenient Verification

Xiaodong Liu, Quan Miao, Daxing Li
{"title":"A Biometric Identity Based Signature Scheme with Convenient Verification","authors":"Xiaodong Liu, Quan Miao, Daxing Li","doi":"10.1109/FGCN.2007.3","DOIUrl":null,"url":null,"abstract":"We describe an identity based signature scheme that uses biometric data to construct the public key. A biometric reading provided by the alleged signer would be enough to verify the signature. We make use of fractal transform and entropy arrangement algorithm to generate the public key string from a biometric measurement. We then make use of Shamir scheme [1] to perform signing and verification. Finally, we describe two possible attacks on this system and suggest ways to combat it. The result of experiments have shown that the scheme could satisfy the practical applies.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Future Generation Communication and Networking (FGCN 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FGCN.2007.3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

We describe an identity based signature scheme that uses biometric data to construct the public key. A biometric reading provided by the alleged signer would be enough to verify the signature. We make use of fractal transform and entropy arrangement algorithm to generate the public key string from a biometric measurement. We then make use of Shamir scheme [1] to perform signing and verification. Finally, we describe two possible attacks on this system and suggest ways to combat it. The result of experiments have shown that the scheme could satisfy the practical applies.
一种方便验证的基于生物特征身份的签名方案
我们描述了一种基于身份的签名方案,该方案使用生物特征数据来构造公钥。被指控的签名者提供的生物识别读数足以验证签名。利用分形变换和熵排列算法从生物特征测量数据中生成公钥串。然后,我们使用Shamir方案[1]进行签名和验证。最后,我们描述了针对该系统的两种可能的攻击,并提出了对抗它的方法。实验结果表明,该方案能够满足实际应用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信