Abstract
We propose a public-key signature and encryption application which strongly relies on identity-based public-key cryptography. By alternately using obvious identity information like names and essential image data of the involved parties as public keys we preserve all advantages gained by identity-based public-key schemes, mainly including the absence of a public-key infrastructure [1]. On the other hand, all parties obtain only obvious and necessary information about other involved parties.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
A. Shamir, Identity-based cryptosystems and signature schemes, Advances in Cryptology-Crypto 84, LNCS 196, pages 47-53, Springer-Verlag, 1984.
D. Chaum, Security without identification: transaction systems to make big brother obsolete. Communications of the ACM, 28, 1030–1044, 1985.
W. Zhao, R. Chellappa, J. Phillips, A. Rosenfeld, Face Recognition: A Literature Survey ACM Computing Surveys, pages 399-458, 2003.
A. Sahai and B. Waters, Fuzzy Identity Based Encryption. In Advances in Cryptology — Eurocrypt, volume 3494 of LNCS, pages 457-473. Springer Verlag, 2005.
Y. Dodis, L. Reyzin, A. Smith, Fuzzy extractors: How to generate string keys from biometrics and other noisy data, In Proceedings of the International Conference on Advances in Cryptology (EUROCRYPT’ 04), Lecture Notes in Computer Science, Springer Verlag, 2004.
H. Tanaka, A Realization Scheme for the Identity-Based Cryptosystem CRYPTO’ 87: A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, Springer-Verlag, pages 340-349, 1988.
S. Tsuji and T. Itoh, An ID-based cryptosystem based on the discrete logarithm problem, IEEE Journal of Selected Areas in Communications, Vol. 7, No. 4, pp. 467–473, 1989.
D. Boneh, M. Franklin, Identity-Based Encryption from the Weil Pairing, SIAM Journal on Computing, vol. 32, issue 3, pages 586–615, 2003.
A. Fiat, A. Shamir, How to prove yourself: practical solutions to identification and signature problems Proceedings on Advances in cryptology, In Proceedings of CRYPTO’ 86, Springer-Verlag, pages 186-194, 1987.
U. Fiege, A. Fiat, A. Shamir, Zero knowledge proofs of identity In Proceedings of the nineteenth annual ACM conference on Theory of computing (STOC’ 87), ACM, pages 210-217, 1987.
J. C. Cha, J. H. Cheon, An Identity-Based Signature from Gap Diffie-Hellman Groups, PKC’ 03: Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography, Springer-Verlag, pages 18-30, 2003.
S. Even, Y. Yacobi, Relations among public key signature systems, Technical Report 175, pages 148-153, Computer Science Dept, Technion, Israel, March, 1980.
N. Asokan, M. Schunter, M. Waidner, Optimistic Protocols for Fair Exchange, In 4th ACM Conference on Computer and Communications Security, pages 7-17, 1997.
H. Bürk, A. Pfitzmann, Value exchange systems enabling security and unobservability, In Computers and Security, vol. 9, pages 715–721, 1990.
Z. Chen, and J. Huang, and D. Huang, and J. Zhang and Y. Wang, Provably secure and ID-based group signature scheme, In Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), volume 2, 384–387, 2004.
V. K. Wei, T. H. Yuen, F. Zhang, Group Signature Where Group Manager, Members and Open Authority Are Identity-Based, In Proceedings of the Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Springer Verlag, pages 468-480, 2005.
Y. Dodis, J. Katz, S. Xu, and M. Yung, Key-insulated public key cryptosystems, Proc. Eurocrypt’02, LNCS 2332, pages 65-82, Springer-Verlag, 2002.
Y. Dodis, M. Franklin, J. Katz, A. Miyaji, and M. Yung, Intrusion-resilient public-key encryption, Proc. CT-RSA’03, LNCS 2612, pages 19-32, Springer-Verlag, 2003.
Y. Dodis, M. Franklin, J. Katz, A. Miyaji, and M. Yung, A generic construction for intrusion-resilient public-key encryption, Proc. CT-RSA’04, LNCS 2964, pages 81-98, Springer-Verlag, 2004.
C. Gentry, A. Silverberg, Hierarchical ID-Based Cryptography, Advances in Cryptology — Asiacrypt’2002, Lecture Notes on Computer Science 2501, Springer-Verlag, pages 548-566, 2002.
J. Horwitz, B. Lynn, Towards Hierarchical Identity-Based Encryption, Advances in Cryptology — Eurocrypt’ 2002, Lecture Notes on Computer Science 2332, Springer-Verlag, pages 466-481, 2002.
Y. Hanaoka, H. Hanaoka, J. Shikata, H. Imai, Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application, Cryptology ePrint Archive, Report 2004/338, 2005.
David Chaum, Blind signatures for untraceable payments, Advances in Cryptology, Proceedings of CRYPTO’ 82 (David Chaum, Ronald L. Rivest, and Alan T. Sherman, eds.), Plenum Press, 1983.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 IFIP International Federation for Information Processing
About this paper
Cite this paper
Pape, S., Benamar, N. (2008). Using Identity-Based Public-Key Cryptography with Images to Preserve Privacy. In: Fischer-Hübner, S., Duquenoy, P., Zuccato, A., Martucci, L. (eds) The Future of Identity in the Information Society. Privacy and Identity 2007. IFIP — The International Federation for Information Processing, vol 262. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-79026-8_21
Download citation
DOI: https://doi.org/10.1007/978-0-387-79026-8_21
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-4629-4
Online ISBN: 978-0-387-79026-8
eBook Packages: Computer ScienceComputer Science (R0)