29,866 research outputs found
Security of a biometric identity-based encryption scheme
Biometric identity-based encryption (Bio-IBE) is a kind of fuzzy
identity-based encryption (fuzzy IBE) where a ciphertext encrypted under an
identity w' can be decrypted using a secret key corresponding to the identity w
which is close to w' as measured by some metric. Recently, Yang et al. proposed
a constant-size Bio-IBE scheme and proved that it is secure against adaptive
chosen-ciphertext attack (CCA2) in the random oracle model. Unfortunately, in
this paper, we will show that their Bio-IBE scheme is even not chosen-plaintext
secure. Specifically, user w using his secret key is able to decrypt any
ciphertext encrypted under an identity w' even though w is not close to w'.Comment: Journal version of the paper will be appearing in International
Journal of Network Securit
Poset-free Families and Lubell-boundedness
Given a finite poset , we consider the largest size \lanp of a family
\F of subsets of that contains no subposet . This
continues the study of the asymptotic growth of \lanp; it has been
conjectured that for all , \pi(P):= \lim_{n\rightarrow\infty} \lanp/\nchn
exists and equals a certain integer, . While this is known to be true for
paths, and several more general families of posets, for the simple diamond
poset \D_2, the existence of frustratingly remains open. Here we
develop theory to show that exists and equals the conjectured value
for many new posets . We introduce a hierarchy of properties for
posets, each of which implies , and some implying more precise
information about \lanp. The properties relate to the Lubell function of a
family \F of subsets, which is the average number of times a random full
chain meets \F. We present an array of examples and constructions that
possess the properties
- …