透過您的圖書館登入
IP:3.15.174.76

並列摘要


We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for example a legal dispute over whether a contract had been signed or not by a user. A biometric reading provided by the alleged signer would be enough to verify the signature. We make use of fuzzy extractors to generate a key string from a variable biometric measurement. We use this biometric based key string and an elliptic curve point embedding technique to create the public key and corresponding private key. We then make use of a pairing based signature scheme to perform signing and verification with these keys. We discuss security issues of the system and suggest countermeasures to attack. Finally we describe a working biometric signature scheme developed in part by reusing components in an existing Java Identity Based Encryption implementation.

被引用紀錄


王家盈(2017)。我的就是你的?以情感分析探討共享經濟下之風險程度〔碩士論文,淡江大學〕。華藝線上圖書館。https://doi.org/10.6846/TKU.2017.00616
Lan, Y. C. (2013). 基於結構差異性的影像分割 [master's thesis, National Chiao Tung University]. Airiti Library. https://doi.org/10.6842/NCTU.2013.00580
Huang, C. C. (2010). 貝氏階層式結構於視訊監控之研究與應用 [doctoral dissertation, National Chiao Tung University]. Airiti Library. https://doi.org/10.6842/NCTU.2010.01079
傅首僖(2013)。以類比按鍵輔助語音操控導航系統〔碩士論文,國立臺北科技大學〕。華藝線上圖書館。https://doi.org/10.6841/NTUT.2013.00272
劉世彬(2016)。從顧客使用行為分析手機應用程式的行動服務設計〔碩士論文,中原大學〕。華藝線上圖書館。https://doi.org/10.6840/cycu201600629

延伸閱讀