1 / 9

Fuzzy Identity Based Encryption

Fuzzy Identity Based Encryption. Brent Waters Current Research with Amit Sahai. An Emergency Medical Appointment. Record visit, test results, etc. Encryption No portable device requirement (can’t carry RSA public key). My key is “Aaron Smith”. Use Identity Based Encryption (IBE).

Download Presentation

Fuzzy Identity Based Encryption

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Fuzzy Identity Based Encryption Brent Waters Current Research with Amit Sahai

  2. An Emergency Medical Appointment • Record visit, test results, etc. • Encryption • No portable device requirement (can’t carry RSA public key) Cryptographic Protocols for Memex

  3. My key is “Aaron Smith” Use Identity Based Encryption (IBE) • Public Key is an identifier string (e.g.“aaron@princeton.edu”) • Use global public parameters • Master secret holder(s) can give out private keys to an individual that authenticates themselves • Boneh and Franklin ‘01 Cryptographic Protocols for Memex

  4. Problems with Standard IBE • What should the identities be? • Names are not unique • Don’t necessarily want to tie to SS#, Driver’s License… • First time users • Don’t have identities yet • Certifying oneself to authority can be troublesome • Need documentation, etc. Cryptographic Protocols for Memex

  5. <0110010…00111010010> Biometric as an Identity • Biometric stays with human • Should be unique (depends on quality of biometric) • Have identity before registration • Certification is natural Cryptographic Protocols for Memex

  6. <0110010…00111010010> <0110110…00111010110> <0100010…00111010110> Biometric as an Identity • Biometric measure changes a little each time • Environment • Difference in Sensors • Small change in trait • Cannot use a biometric as an identity in current IBE schemes Cryptographic Protocols for Memex

  7. <0100110…00111010110> <0110010…00111010010> M Fuzzy Identity Based Encryption A secret key for IDcan decrypt a ciphertext encrypted withID’iff Hamming Distance(ID,ID’)  d Encrypted with ID’ Private Key for ID Cryptographic Protocols for Memex

  8. <0010110…00011110110> <0110010…00111010010> Fuzzy Identity Based Encryption A secret key for IDcan decrypt a ciphertext encrypted withID’iff Hamming Distance(ID,ID’)  d Encrypted with ID’ Private Key for ID Cryptographic Protocols for Memex

  9. Final points • The biometric input is a public key, not a secret • Work is available on e-print and www.cs.princeton.edu/~bwaters/publications Cryptographic Protocols for Memex

More Related