IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Biometric Identity Based Encryption: Security, Efficiency and Implementation Challenges

Author(s): Neyire Deniz Sarier (Bonn-Aachen International Center for Information Technology, Germany)
Copyright: 2011
Pages: 13
EISBN13: 9781609606527

Purchase

View Biometric Identity Based Encryption: Security, Efficiency and Implementation Challenges on the publisher's website for pricing and purchasing information.

View Sample PDF


Abstract

In this chapter, we evaluate the security properties and different applications of Identity Based Encryption (IBE) systems. Particularly, we consider biometric identities for IBE, which is a new encryption system defined as fuzzy IBE. Next, we analyze the security aspects of fuzzy IBE in terms of the security notions it must achieve and the prevention of collusion attacks, which is an attack scenario specific to fuzzy IBE. In this context, we present a new method that avoids the collusion attacks and describe the currently most efficient biometric IBE scheme that implements this new method. Also, we investigate implementation challenges for biometric IBE systems, where fuzzy IBE could be a potential cryptographic primitive for biometric smartcards. Due to the limited computational power of these devices, a different solution for biometric IBE is considered, which is the encryption analogue of the biometric identity based signature system of Burnett et al. (2007). Finally, we state the future trends for biometric IBE systems and conclude our results.

Related Content

Lida J. Uribe-Flórez, Jesús Trespalacios. © 2013. 11 pages.
Despina Varnava-Marouchou, Mark A. Minott. © 2014. 21 pages.
Uwe Matthias Richter, Sarada Veerabhatla, Larysa Zasiekina. © 2021. 23 pages.
Maresa Bertolo, Ilaria Mariani. © 2014. 22 pages.
MARK Bedoya Ulla, Quang Nhat Nguyen. © 2022. 24 pages.
Body Bottom