Font Size: a A A

Constructions And Applications Of Fuzzy Signature Scheme

Posted on:2022-12-15Degree:MasterType:Thesis
Country:ChinaCandidate:J SongFull Text:PDF
GTID:2518306779470134Subject:Automation Technology
Abstract/Summary:PDF Full Text Request
With the rapid development and wide application of network,the problem of network information security is attracting more and more attention.User authentication system is the core infrastructure of digital society,among which the most widely used authentication methods are digital signature and biometric authentication.However,sinc the signing key of signature scheme is generally required to be uniform random,when using digital signa-ture for user authentication,it is a burden for users to generate and store such signing key safely.When biometric authentication is used for user authentication,users generally need to entry their biometric information and store it in the central server during the registration stage.Once the central server is breached,it will lead to large-scale leakage of biometric information.Fuzzy signature can solve the above problems.Like ordinary signature,it provides users with identity authentication,nonrepudiation and protection of data integrity in the field of information security.Different from ordinary signature,fuzzy signature allows users to sign with non-uniform random biometric information as a signing key,and does not require accurate storage of biometric information.Therefore,the study of fuzzy signature has high theoretical and application value.On the basis of the current research,this paper focuses on the construction and appli-cation of fuzzy signature scheme,and has achieved the following results:·We propose a fuzzy signature scheme based on standard assumption and a fuzzy signature scheme which is secure against quantum attack.First,we give a defini-tion and a more practical security model of fuzzy signature.Compared with the previ-ous security model,our security model does not require the error distribution between different samples of biometric information to be independent of the biometric infor-mation,but allows the error to be arbitrarily dependent on the biometric information.Then,we present a generic construction of fuzzy signature based on a fuzzy extractor and a signature scheme with a simple key generation process.By instantiation,we ob-tain a fuzzy signature SIGF1which is secure under the computational Diffie-Hellman(CDH)assumption in the standard model and a fuzzy signature SIGF2that is secure in the random oracle model under the worst-case hardness of the (?)(n1.5)-SIVP problem.Finally,we simulate the fuzzy signature scheme SIGF1.·We propose a fuzzy signature scheme without the verification key as input in the signing algorithm based on standard assumption.First,we present a new defini-tion and security model of fuzzy signature.In this definition,the signing algorithm does not need verification key as input.The security model requires that the error between different samples of biometric information can be adaptively chosen by the adversary.Then,we define the homomorphic property of signature scheme,key-shift*security of signature scheme and the error recovery property of secure sketch.We give another generic construction of fuzzy signature scheme based on the homomor-phic secure sketch with error recovery property,homomorphic extractor and signature scheme with homomorphic property.Finally,by instantiation,we obtain a fuzzy signa-ture SIGF3which is secure under the computational Diffie-Hellman(CDH)assumption in the standard model.·We propose a data integrity verification scheme based on fuzzy signature.We optimize the ZSS short signature scheme by the first generic construction and obtain a fuzzy ZSS short signature scheme.By applying the fuzzy ZSS short signature scheme to the data integrity verification scheme,we obtain a data integrity verification scheme based on fuzzy ZSS short signature,and analyze the scheme.
Keywords/Search Tags:digital signature, secure sketch, fuzzy extractor, fuzzy signature, data integrity verification
PDF Full Text Request
Related items