KEYWORDS: Biometrics, Fuzzy logic, Cryptography, Distributed interactive simulations, Information security, Tolerancing, Time metrology, Visualization, Image processing, Current controlled current source
How to apply the entropy in biometrics into the encryption and remote authentication schemes to simplify the
management of keys is a hot research area. Utilizing Dodis’s fuzzy extractor method and Liu’s original signcryption
scheme, a biometric identity based signcryption scheme is proposed in this paper. The proposed scheme is more efficient
than most of the previous proposed biometric signcryption schemes for that it does not need bilinear pairing computation
and modular exponentiation computation which is time consuming largely. The analysis results show that under the
CDH and DL hard problem assumption, the proposed scheme has the features of confidentiality and unforgeability
simultaneously.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.