Fuzzy identity-based encryption

被引:2856
作者
Sahai, A
Waters, B
机构
[1] Univ Calif Los Angeles, Los Angeles, CA 90024 USA
[2] Stanford Univ, Stanford, CA 94305 USA
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS | 2005年 / 3494卷
关键词
D O I
10.1007/11426639_27
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy Identity-Based Encryption. In Fuzzy IBE we view an identity as set of descriptive attributes. A Fuzzy IBE scheme allows for a private key for an identity, omega, to decrypt a ciphertext encrypted with an identity, omega', if and only if the identities omega and omega' are close to each other as measured by the "set overlap" distance metric. A Fuzzy IBE scheme can be applied to enable encryption using biometric inputs as identities; the error-tolerance property of a Fuzzy IBE scheme is precisely what allows for the use of biometric identities, which inherently will have some noise each time they are sampled. Additionally, we show that Fuzzy-IBE can be used for a type of application that we term "attribute-based encryption". In this paper we present two constructions of Fuzzy IBE schemes. Our constructions can be viewed as an Identity-Based Encryption of a message under several attributes that compose a (fuzzy) identity. Our IBE schemes are both error-tolerant and secure against collusion attacks. Additionally, our basic construction does not use random oracles. We prove the security of our schemes under the Selective-ID security model.
引用
收藏
页码:457 / 473
页数:17
相关论文
共 17 条
[1]  
[Anonymous], P CRYPTO
[2]  
[Anonymous], P 40 IEEE S FDN COMP
[3]  
Bellare M., 2001, LECT NOTES COMPUTER, V2248
[4]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[5]  
BONEH D, 2004, LECT NOTES COMPUTER
[6]  
BOYEN X, 2004, ACM C COMP COMM SEC
[7]  
CANETTI R, 2003, P EUR 2003
[8]  
DAVIDA G, 1998, IEEE S PRIV SEC
[9]  
Dodis Y., 2004, LECT NOTES COMPUTER
[10]  
Juels A, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P28, DOI 10.1145/319709.319714