90 likes | 117 Views
Explore cutting-edge research in using fuzzy identities for encryption, eliminating the need for portable devices, and addressing challenges in standard identity-based encryption models. Learn about incorporating biometric data for secure authentication and access control in cryptographic protocols.
E N D
Fuzzy Identity Based Encryption Brent Waters Current Research with Amit Sahai
An Emergency Medical Appointment • Record visit, test results, etc. • Encryption • No portable device requirement (can’t carry RSA public key) Cryptographic Protocols for Memex
My key is “Aaron Smith” Use Identity Based Encryption (IBE) • Public Key is an identifier string (e.g.“aaron@princeton.edu”) • Use global public parameters • Master secret holder(s) can give out private keys to an individual that authenticates themselves • Boneh and Franklin ‘01 Cryptographic Protocols for Memex
Problems with Standard IBE • What should the identities be? • Names are not unique • Don’t necessarily want to tie to SS#, Driver’s License… • First time users • Don’t have identities yet • Certifying oneself to authority can be troublesome • Need documentation, etc. Cryptographic Protocols for Memex
<0110010…00111010010> Biometric as an Identity • Biometric stays with human • Should be unique (depends on quality of biometric) • Have identity before registration • Certification is natural Cryptographic Protocols for Memex
<0110010…00111010010> <0110110…00111010110> <0100010…00111010110> Biometric as an Identity • Biometric measure changes a little each time • Environment • Difference in Sensors • Small change in trait • Cannot use a biometric as an identity in current IBE schemes Cryptographic Protocols for Memex
<0100110…00111010110> <0110010…00111010010> M Fuzzy Identity Based Encryption A secret key for IDcan decrypt a ciphertext encrypted withID’iff Hamming Distance(ID,ID’) d Encrypted with ID’ Private Key for ID Cryptographic Protocols for Memex
<0010110…00011110110> <0110010…00111010010> Fuzzy Identity Based Encryption A secret key for IDcan decrypt a ciphertext encrypted withID’iff Hamming Distance(ID,ID’) d Encrypted with ID’ Private Key for ID Cryptographic Protocols for Memex
Final points • The biometric input is a public key, not a secret • Work is available on e-print and www.cs.princeton.edu/~bwaters/publications Cryptographic Protocols for Memex