PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
  • Sesja wygasła!
  • Sesja wygasła!
  • Sesja wygasła!
Tytuł artykułu

Certificate-less digital signature technology for e-Governance solutions

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In spite of the fact that digital signing is an essential requirement for implementation of e-governance solutions in any organization, its use in large scale Government ICT implementation is negligible in India. In order to understand the reasons for low-level acceptance of the technology, authors performed a detailed study of a famous e-governance initiative of India. The outcome of the study revealed that the reasons are related to the challenges concerning the use of cryptographic devices carrying private key and the complicated process of generation, maintenance and disposal of Digital Signature Certificates (DSC). The solution, for the challenges understood from the case study, required implementation of a certificateless technology where private keys should be generated as and when required rather than storing them on cryptographic devices. Although many solutions which provide certificateless technology exist, to date there have been no practical implementation for using biometrics for implementing the solution. This paper presents the first realistic architecture to implement Identity Based Cryptography with biometrics using RSA algorithm. The solution presented in the paper is capable of providing a certificate-less digital signature technology to the users, where public and private keys are generated on-the-fly.
Wydawca
Czasopismo
Rocznik
Strony
431--452
Opis fizyczny
Bibliogr. 28 poz., rys., tab.
Twórcy
autor
  • Research Scholar, Bharathiar University, Coimbatore, Tamil Nadu, India
  • Dean (Academics), Dayananda Sagar Academy of Technology and Management, Bangalore, India
Bibliografia
  • [1] Ang R., Safavi-Naini R., McAven L.: Cancelable key-based fingerprint templates. In: Australasian conference on information security and privacy, pp. 242–252. Springer, 2005.
  • [2] Baek J., Zheng Y.: Identity-based threshold decryption. In: International Workshop on Public Key Cryptography, pp. 262–276. Springer, 2004.
  • [3] Boldyreva A., Goyal V., Kumar V.: Identity-based encryption with efficient revocation. In: Proceedings of the 15th ACM conference on Computer and communications security, pp. 417–426. ACM, 2008.
  • [4] Boneh D., Ding X., Tsudik G.: Identity-based mediated RSA. In: 3rd Workshop on Information Security Application, Jeju Island, Korea, vol. 12. Citeseer, 2002.
  • [5] Boneh D., Franklin M.: Identity-based encryption from the Weil pairing. In: Annual international cryptology conference, pp. 213–229. Springer, 2001.
  • [6] Chen L., Malone-Lee J.: Improved identity-based signcryption. In: International Workshop on Public Key Cryptography, pp. 362–379. Springer, 2005.
  • [7] Conti V., Vitabile S., Sorbello F.: Fingerprint traits and RSA algorithm fusion technique. In: 2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems, pp. 351–356. IEEE, 2012.
  • [8] Diffie W., Hellman M.: New directions in cryptography. In: IEEE transactions on Information Theory, vol. 22(6), pp. 644–654, 1976.
  • [9] Ding X., Tsudik G.: Simple identity-based cryptography with mediated RSA. In: Cryptographers’ Track at the RSA Conference, pp. 193–210. Springer, 2003.
  • [10] Elashry I., Mu Y., Susilo W.: Identity-based mediated RSA revisited. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 728–735. IEEE, 2013.
  • [11] Gerguri S.: Biometrics used for random number generation. Ph.D. thesis, Masarykova univerzita, Fakulta informatiky, 2008.
  • [12] Gutmann P.: Engineering security. In: , 2013.
  • [13] JIANG W.q., HUANG Z.q., YANG Y.x., Jie T., Liang L.: ID-based authentication scheme combined with identity-based encryption with fingerprint hashing. In: The Journal of China Universities of Posts and Telecommunications, vol. 15(4), pp. 75–120, 2008.
  • [14] Jin Z., Ong T.S., Tee C., Teoh A.B.J.: Generating revocable fingerprint template using polar grid based 3-tuple quantization technique. In: 2011 IEEE 54th International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 1–4. IEEE, 2011.
  • [15] Jin Z., Teoh A.B.J., Ong T.S., Tee C.: Secure minutiae-based fingerprint templates using random triangle hashing. In: International Visual Informatics Conference, pp. 521–531. Springer, 2009.
  • [16] Jin Z., Teoh A.B.J., Ong T.S., Tee C.: Fingerprint template protection with minutiae-based bit-string for security and privacy preserving. In: Expert systems with applications, vol. 39(6), pp. 6157–6167, 2012.
  • [17] Kate A., Goldberg I.: Distributed private-key generators for identity-based cryptography. In: International Conference on Security and Cryptography for Networks, pp. 436–453. Springer, 2010.
  • [18] Li L., Jiang W.Q., Tian J., Yang Y.X., Jiang C.P., Wu Z., Yang X.: A networking identity authentication scheme combining fingerprint coding and identity based encryption. In: 2007 IEEE Intelligence and Security Informatics, pp. 129–132. IEEE, 2007.
  • [19] Quan F., Fei S., Anni C., Feifei Z.: Cracking cancelable fingerprint template of Ratha. In: 2008 International Symposium on Computer Science and Computational Technology, vol. 2, pp. 572–575. IEEE, 2008.
  • [20] Ratha N.K., Chikkerur S., Connell J.H., Bolle R.M.: Generating cancelable fingerprint templates. In: IEEE Transactions on pattern analysis and machine intelligence, vol. 29(4), pp. 561–572, 2007.
  • [21] Seo J.H., Emura K.: Revocable identity-based encryption revisited: Security model and construction. In: International Workshop on Public Key Cryptography, pp. 216–234. Springer, 2013.
  • [22] Shamir A.: How to share a secret. In: Communications of the ACM, vol. 22(11), pp. 612–613, 1979.
  • [23] Shamir A.: Identity-based cryptosystems and signature schemes. In: Workshop on the theory and application of cryptographic techniques, pp. 47–53. Springer, 1984.
  • [24] Shin S.W., Lee M.K., Moon D., Moon K.: Dictionary attack on functional transform-based cancelable fingerprint templates. In: ETRI journal, vol. 31(5), pp. 628–630, 2009.
  • [25] Susilo W., Guo F., Mu Y.: Efficient dynamic threshold identity-based encryption with constant-size ciphertext. In: Theoretical Computer Science, vol. 609, pp. 49–59, 2016.
  • [26] Thian Song O., Teoh Beng Jin A., Connie T.: Personalized biometric key using fingerprint biometrics. In: Information Management & Computer Security, vol. 15(4), pp. 313–328, 2007.
  • [27] Wong W.J., Wong M.D., Kho Y.H., Beng A., Teoh J.: Minutiae set to bit-string conversion using multi-scale bag-of-words paradigm. In: 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1–6. IEEE, 2014.
  • [28] Yuen T.H., Wei V.K.: Fast and proven secure blind identity-based signcryption from pairings. In: Cryptographers’ Track at the RSA Conference, pp. 305–322. Springer, 2005.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-25083fc3-4b8e-47f5-9757-06f19c73b3da
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.