{"title":"一种方便验证的基于生物特征身份的签名方案","authors":"Xiaodong Liu, Quan Miao, Daxing Li","doi":"10.1109/FGCN.2007.3","DOIUrl":null,"url":null,"abstract":"We describe an identity based signature scheme that uses biometric data to construct the public key. A biometric reading provided by the alleged signer would be enough to verify the signature. We make use of fractal transform and entropy arrangement algorithm to generate the public key string from a biometric measurement. We then make use of Shamir scheme [1] to perform signing and verification. Finally, we describe two possible attacks on this system and suggest ways to combat it. The result of experiments have shown that the scheme could satisfy the practical applies.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Biometric Identity Based Signature Scheme with Convenient Verification\",\"authors\":\"Xiaodong Liu, Quan Miao, Daxing Li\",\"doi\":\"10.1109/FGCN.2007.3\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We describe an identity based signature scheme that uses biometric data to construct the public key. A biometric reading provided by the alleged signer would be enough to verify the signature. We make use of fractal transform and entropy arrangement algorithm to generate the public key string from a biometric measurement. We then make use of Shamir scheme [1] to perform signing and verification. Finally, we describe two possible attacks on this system and suggest ways to combat it. The result of experiments have shown that the scheme could satisfy the practical applies.\",\"PeriodicalId\":254368,\"journal\":{\"name\":\"Future Generation Communication and Networking (FGCN 2007)\",\"volume\":\"33 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-12-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Future Generation Communication and Networking (FGCN 2007)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FGCN.2007.3\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Future Generation Communication and Networking (FGCN 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FGCN.2007.3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Biometric Identity Based Signature Scheme with Convenient Verification
We describe an identity based signature scheme that uses biometric data to construct the public key. A biometric reading provided by the alleged signer would be enough to verify the signature. We make use of fractal transform and entropy arrangement algorithm to generate the public key string from a biometric measurement. We then make use of Shamir scheme [1] to perform signing and verification. Finally, we describe two possible attacks on this system and suggest ways to combat it. The result of experiments have shown that the scheme could satisfy the practical applies.