29,866 research outputs found

    Security of a biometric identity-based encryption scheme

    Full text link
    Biometric identity-based encryption (Bio-IBE) is a kind of fuzzy identity-based encryption (fuzzy IBE) where a ciphertext encrypted under an identity w' can be decrypted using a secret key corresponding to the identity w which is close to w' as measured by some metric. Recently, Yang et al. proposed a constant-size Bio-IBE scheme and proved that it is secure against adaptive chosen-ciphertext attack (CCA2) in the random oracle model. Unfortunately, in this paper, we will show that their Bio-IBE scheme is even not chosen-plaintext secure. Specifically, user w using his secret key is able to decrypt any ciphertext encrypted under an identity w' even though w is not close to w'.Comment: Journal version of the paper will be appearing in International Journal of Network Securit

    Poset-free Families and Lubell-boundedness

    Full text link
    Given a finite poset PP, we consider the largest size \lanp of a family \F of subsets of [n]:={1,...,n}[n]:=\{1,...,n\} that contains no subposet PP. This continues the study of the asymptotic growth of \lanp; it has been conjectured that for all PP, \pi(P):= \lim_{n\rightarrow\infty} \lanp/\nchn exists and equals a certain integer, e(P)e(P). While this is known to be true for paths, and several more general families of posets, for the simple diamond poset \D_2, the existence of π\pi frustratingly remains open. Here we develop theory to show that π(P)\pi(P) exists and equals the conjectured value e(P)e(P) for many new posets PP. We introduce a hierarchy of properties for posets, each of which implies π=e\pi=e, and some implying more precise information about \lanp. The properties relate to the Lubell function of a family \F of subsets, which is the average number of times a random full chain meets \F. We present an array of examples and constructions that possess the properties
    corecore