Skip to main content

Using Identity-Based Public-Key Cryptography with Images to Preserve Privacy

  • Conference paper
  • 1338 Accesses

Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT,volume 262)


We propose a public-key signature and encryption application which strongly relies on identity-based public-key cryptography. By alternately using obvious identity information like names and essential image data of the involved parties as public keys we preserve all advantages gained by identity-based public-key schemes, mainly including the absence of a public-key infrastructure [1]. On the other hand, all parties obtain only obvious and necessary information about other involved parties.


  • Signature Scheme
  • Group Signature Scheme
  • Fuzzy Extractor
  • Certification Revocation List
  • Train Ticket

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. A. Shamir, Identity-based cryptosystems and signature schemes, Advances in Cryptology-Crypto 84, LNCS 196, pages 47-53, Springer-Verlag, 1984.

    Google Scholar 

  2. D. Chaum, Security without identification: transaction systems to make big brother obsolete. Communications of the ACM, 28, 1030–1044, 1985.

    CrossRef  Google Scholar 

  3. W. Zhao, R. Chellappa, J. Phillips, A. Rosenfeld, Face Recognition: A Literature Survey ACM Computing Surveys, pages 399-458, 2003.

    Google Scholar 

  4. A. Sahai and B. Waters, Fuzzy Identity Based Encryption. In Advances in Cryptology — Eurocrypt, volume 3494 of LNCS, pages 457-473. Springer Verlag, 2005.

    Google Scholar 

  5. Y. Dodis, L. Reyzin, A. Smith, Fuzzy extractors: How to generate string keys from biometrics and other noisy data, In Proceedings of the International Conference on Advances in Cryptology (EUROCRYPT’ 04), Lecture Notes in Computer Science, Springer Verlag, 2004.

    Google Scholar 

  6. H. Tanaka, A Realization Scheme for the Identity-Based Cryptosystem CRYPTO’ 87: A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, Springer-Verlag, pages 340-349, 1988.

    Google Scholar 

  7. S. Tsuji and T. Itoh, An ID-based cryptosystem based on the discrete logarithm problem, IEEE Journal of Selected Areas in Communications, Vol. 7, No. 4, pp. 467–473, 1989.

    CrossRef  Google Scholar 

  8. D. Boneh, M. Franklin, Identity-Based Encryption from the Weil Pairing, SIAM Journal on Computing, vol. 32, issue 3, pages 586–615, 2003.

    MathSciNet  CrossRef  MATH  Google Scholar 

  9. A. Fiat, A. Shamir, How to prove yourself: practical solutions to identification and signature problems Proceedings on Advances in cryptology, In Proceedings of CRYPTO’ 86, Springer-Verlag, pages 186-194, 1987.

    Google Scholar 

  10. U. Fiege, A. Fiat, A. Shamir, Zero knowledge proofs of identity In Proceedings of the nineteenth annual ACM conference on Theory of computing (STOC’ 87), ACM, pages 210-217, 1987.

    Google Scholar 

  11. J. C. Cha, J. H. Cheon, An Identity-Based Signature from Gap Diffie-Hellman Groups, PKC’ 03: Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography, Springer-Verlag, pages 18-30, 2003.

    Google Scholar 

  12. S. Even, Y. Yacobi, Relations among public key signature systems, Technical Report 175, pages 148-153, Computer Science Dept, Technion, Israel, March, 1980.

    Google Scholar 

  13. N. Asokan, M. Schunter, M. Waidner, Optimistic Protocols for Fair Exchange, In 4th ACM Conference on Computer and Communications Security, pages 7-17, 1997.

    Google Scholar 

  14. H. Bürk, A. Pfitzmann, Value exchange systems enabling security and unobservability, In Computers and Security, vol. 9, pages 715–721, 1990.

    CrossRef  Google Scholar 

  15. Z. Chen, and J. Huang, and D. Huang, and J. Zhang and Y. Wang, Provably secure and ID-based group signature scheme, In Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), volume 2, 384–387, 2004.

    CrossRef  Google Scholar 

  16. V. K. Wei, T. H. Yuen, F. Zhang, Group Signature Where Group Manager, Members and Open Authority Are Identity-Based, In Proceedings of the Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Springer Verlag, pages 468-480, 2005.

    Google Scholar 

  17. Y. Dodis, J. Katz, S. Xu, and M. Yung, Key-insulated public key cryptosystems, Proc. Eurocrypt’02, LNCS 2332, pages 65-82, Springer-Verlag, 2002.

    Google Scholar 

  18. Y. Dodis, M. Franklin, J. Katz, A. Miyaji, and M. Yung, Intrusion-resilient public-key encryption, Proc. CT-RSA’03, LNCS 2612, pages 19-32, Springer-Verlag, 2003.

    Google Scholar 

  19. Y. Dodis, M. Franklin, J. Katz, A. Miyaji, and M. Yung, A generic construction for intrusion-resilient public-key encryption, Proc. CT-RSA’04, LNCS 2964, pages 81-98, Springer-Verlag, 2004.

    Google Scholar 

  20. C. Gentry, A. Silverberg, Hierarchical ID-Based Cryptography, Advances in Cryptology — Asiacrypt’2002, Lecture Notes on Computer Science 2501, Springer-Verlag, pages 548-566, 2002.

    Google Scholar 

  21. J. Horwitz, B. Lynn, Towards Hierarchical Identity-Based Encryption, Advances in Cryptology — Eurocrypt’ 2002, Lecture Notes on Computer Science 2332, Springer-Verlag, pages 466-481, 2002.

    Google Scholar 

  22. Y. Hanaoka, H. Hanaoka, J. Shikata, H. Imai, Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application, Cryptology ePrint Archive, Report 2004/338, 2005.

    Google Scholar 

  23. David Chaum, Blind signatures for untraceable payments, Advances in Cryptology, Proceedings of CRYPTO’ 82 (David Chaum, Ronald L. Rivest, and Alan T. Sherman, eds.), Plenum Press, 1983.

    Google Scholar 

Download references

Author information

Authors and Affiliations


Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2008 IFIP International Federation for Information Processing

About this paper

Cite this paper

Pape, S., Benamar, N. (2008). Using Identity-Based Public-Key Cryptography with Images to Preserve Privacy. In: Fischer-Hübner, S., Duquenoy, P., Zuccato, A., Martucci, L. (eds) The Future of Identity in the Information Society. Privacy and Identity 2007. IFIP — The International Federation for Information Processing, vol 262. Springer, Boston, MA.

Download citation

  • DOI:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4419-4629-4

  • Online ISBN: 978-0-387-79026-8

  • eBook Packages: Computer ScienceComputer Science (R0)