Using Identity-Based Public-Key Cryptography with Images to Preserve Privacy

  • Sebastian Pape
  • Nabil Benamar
Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 262)


We propose a public-key signature and encryption application which strongly relies on identity-based public-key cryptography. By alternately using obvious identity information like names and essential image data of the involved parties as public keys we preserve all advantages gained by identity-based public-key schemes, mainly including the absence of a public-key infrastructure [1]. On the other hand, all parties obtain only obvious and necessary information about other involved parties.


Signature Scheme Group Signature Scheme Fuzzy Extractor Certification Revocation List Train Ticket 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    A. Shamir, Identity-based cryptosystems and signature schemes, Advances in Cryptology-Crypto 84, LNCS 196, pages 47-53, Springer-Verlag, 1984.Google Scholar
  2. 2.
    D. Chaum, Security without identification: transaction systems to make big brother obsolete. Communications of the ACM, 28, 1030–1044, 1985.CrossRefGoogle Scholar
  3. 3.
    W. Zhao, R. Chellappa, J. Phillips, A. Rosenfeld, Face Recognition: A Literature Survey ACM Computing Surveys, pages 399-458, 2003.Google Scholar
  4. 4.
    A. Sahai and B. Waters, Fuzzy Identity Based Encryption. In Advances in Cryptology — Eurocrypt, volume 3494 of LNCS, pages 457-473. Springer Verlag, 2005.Google Scholar
  5. 5.
    Y. Dodis, L. Reyzin, A. Smith, Fuzzy extractors: How to generate string keys from biometrics and other noisy data, In Proceedings of the International Conference on Advances in Cryptology (EUROCRYPT’ 04), Lecture Notes in Computer Science, Springer Verlag, 2004.Google Scholar
  6. 6.
    H. Tanaka, A Realization Scheme for the Identity-Based Cryptosystem CRYPTO’ 87: A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, Springer-Verlag, pages 340-349, 1988.Google Scholar
  7. 7.
    S. Tsuji and T. Itoh, An ID-based cryptosystem based on the discrete logarithm problem, IEEE Journal of Selected Areas in Communications, Vol. 7, No. 4, pp. 467–473, 1989.CrossRefGoogle Scholar
  8. 8.
    D. Boneh, M. Franklin, Identity-Based Encryption from the Weil Pairing, SIAM Journal on Computing, vol. 32, issue 3, pages 586–615, 2003.MathSciNetCrossRefzbMATHGoogle Scholar
  9. 9.
    A. Fiat, A. Shamir, How to prove yourself: practical solutions to identification and signature problems Proceedings on Advances in cryptology, In Proceedings of CRYPTO’ 86, Springer-Verlag, pages 186-194, 1987.Google Scholar
  10. 10.
    U. Fiege, A. Fiat, A. Shamir, Zero knowledge proofs of identity In Proceedings of the nineteenth annual ACM conference on Theory of computing (STOC’ 87), ACM, pages 210-217, 1987.Google Scholar
  11. 11.
    J. C. Cha, J. H. Cheon, An Identity-Based Signature from Gap Diffie-Hellman Groups, PKC’ 03: Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography, Springer-Verlag, pages 18-30, 2003.Google Scholar
  12. 12.
    S. Even, Y. Yacobi, Relations among public key signature systems, Technical Report 175, pages 148-153, Computer Science Dept, Technion, Israel, March, 1980.Google Scholar
  13. 13.
    N. Asokan, M. Schunter, M. Waidner, Optimistic Protocols for Fair Exchange, In 4th ACM Conference on Computer and Communications Security, pages 7-17, 1997.Google Scholar
  14. 14.
    H. Bürk, A. Pfitzmann, Value exchange systems enabling security and unobservability, In Computers and Security, vol. 9, pages 715–721, 1990.CrossRefGoogle Scholar
  15. 15.
    Z. Chen, and J. Huang, and D. Huang, and J. Zhang and Y. Wang, Provably secure and ID-based group signature scheme, In Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), volume 2, 384–387, 2004.CrossRefGoogle Scholar
  16. 16.
    V. K. Wei, T. H. Yuen, F. Zhang, Group Signature Where Group Manager, Members and Open Authority Are Identity-Based, In Proceedings of the Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Springer Verlag, pages 468-480, 2005.Google Scholar
  17. 17.
    Y. Dodis, J. Katz, S. Xu, and M. Yung, Key-insulated public key cryptosystems, Proc. Eurocrypt’02, LNCS 2332, pages 65-82, Springer-Verlag, 2002.Google Scholar
  18. 18.
    Y. Dodis, M. Franklin, J. Katz, A. Miyaji, and M. Yung, Intrusion-resilient public-key encryption, Proc. CT-RSA’03, LNCS 2612, pages 19-32, Springer-Verlag, 2003.Google Scholar
  19. 19.
    Y. Dodis, M. Franklin, J. Katz, A. Miyaji, and M. Yung, A generic construction for intrusion-resilient public-key encryption, Proc. CT-RSA’04, LNCS 2964, pages 81-98, Springer-Verlag, 2004.Google Scholar
  20. 20.
    C. Gentry, A. Silverberg, Hierarchical ID-Based Cryptography, Advances in Cryptology — Asiacrypt’2002, Lecture Notes on Computer Science 2501, Springer-Verlag, pages 548-566, 2002.Google Scholar
  21. 21.
    J. Horwitz, B. Lynn, Towards Hierarchical Identity-Based Encryption, Advances in Cryptology — Eurocrypt’ 2002, Lecture Notes on Computer Science 2332, Springer-Verlag, pages 466-481, 2002.Google Scholar
  22. 22.
    Y. Hanaoka, H. Hanaoka, J. Shikata, H. Imai, Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application, Cryptology ePrint Archive, Report 2004/338, 2005.Google Scholar
  23. 23.
    David Chaum, Blind signatures for untraceable payments, Advances in Cryptology, Proceedings of CRYPTO’ 82 (David Chaum, Ronald L. Rivest, and Alan T. Sherman, eds.), Plenum Press, 1983.Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2008

Authors and Affiliations

  • Sebastian Pape
    • 1
  • Nabil Benamar
    • 1
  1. 1.Databases and Interactive Systems Research GroupUniversity of KasselKasselGermany

Personalised recommendations