120 likes | 722 Views
Fuzzy Identity Based Encryption. Brent Waters Current Research with Amit Sahai. An Emergency Medical Appointment. Record visit, test results, etc. Encryption No portable device requirement (can’t carry RSA public key). My key is “Aaron Smith”. Use Identity Based Encryption (IBE).
E N D
Fuzzy Identity Based Encryption Brent Waters Current Research with Amit Sahai
An Emergency Medical Appointment • Record visit, test results, etc. • Encryption • No portable device requirement (can’t carry RSA public key) Cryptographic Protocols for Memex
My key is “Aaron Smith” Use Identity Based Encryption (IBE) • Public Key is an identifier string (e.g.“aaron@princeton.edu”) • Use global public parameters • Master secret holder(s) can give out private keys to an individual that authenticates themselves • Boneh and Franklin ‘01 Cryptographic Protocols for Memex
Problems with Standard IBE • What should the identities be? • Names are not unique • Don’t necessarily want to tie to SS#, Driver’s License… • First time users • Don’t have identities yet • Certifying oneself to authority can be troublesome • Need documentation, etc. Cryptographic Protocols for Memex
<0110010…00111010010> Biometric as an Identity • Biometric stays with human • Should be unique (depends on quality of biometric) • Have identity before registration • Certification is natural Cryptographic Protocols for Memex
<0110010…00111010010> <0110110…00111010110> <0100010…00111010110> Biometric as an Identity • Biometric measure changes a little each time • Environment • Difference in Sensors • Small change in trait • Cannot use a biometric as an identity in current IBE schemes Cryptographic Protocols for Memex
<0100110…00111010110> <0110010…00111010010> M Fuzzy Identity Based Encryption A secret key for IDcan decrypt a ciphertext encrypted withID’iff Hamming Distance(ID,ID’) d Encrypted with ID’ Private Key for ID Cryptographic Protocols for Memex
<0010110…00011110110> <0110010…00111010010> Fuzzy Identity Based Encryption A secret key for IDcan decrypt a ciphertext encrypted withID’iff Hamming Distance(ID,ID’) d Encrypted with ID’ Private Key for ID Cryptographic Protocols for Memex
Final points • The biometric input is a public key, not a secret • Work is available on e-print and www.cs.princeton.edu/~bwaters/publications Cryptographic Protocols for Memex