{"@context":{"@vocab":"https://cir.nii.ac.jp/schema/1.0/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/","foaf":"http://xmlns.com/foaf/0.1/","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","datacite":"https://schema.datacite.org/meta/kernel-4/","ndl":"http://ndl.go.jp/dcndl/terms/","jpcoar":"https://github.com/JPCOAR/schema/blob/master/2.0/"},"@id":"https://cir.nii.ac.jp/crid/1360021393777244288.json","@type":"Article","productIdentifier":[{"identifier":{"@type":"DOI","@value":"10.1007/s10207-019-00428-z"}},{"identifier":{"@type":"URI","@value":"http://link.springer.com/article/10.1007/s10207-019-00428-z/fulltext.html"}},{"identifier":{"@type":"URI","@value":"http://link.springer.com/content/pdf/10.1007/s10207-019-00428-z.pdf"}}],"dc:title":[{"@value":"Signature schemes with a fuzzy private key"}],"description":[{"notation":[{"@value":"In this paper, we introduce a new concept of digital signature that we call fuzzy signature, which is a signature scheme that uses a noisy string such as biometric data as a private key, but does not require user-specific auxiliary data (which is also called a helper string in the context of fuzzy extractors), for generating a signature. Our technical contributions are threefold: (1) we first give the formal definition of fuzzy signature, together with a formal definition of a “setting” that specifies some necessary information for fuzzy data. (2) We give a generic construction of a fuzzy signature scheme based on a signature scheme that has certain homomorphic properties regarding keys and satisfies a kind of related key attack security with respect to addition, and a new tool that we call linear sketch. (3) We specify two concrete settings for fuzzy data, and for each of the settings give a concrete instantiation of these building blocks for our generic construction, leading to two concrete fuzzy signature schemes. We also discuss how fuzzy signature schemes can be used to realize a biometric-based PKI that uses biometric data itself as a cryptographic key, which we call the public biometric infrastructure."}]}],"creator":[{"@id":"https://cir.nii.ac.jp/crid/1380021393777244419","@type":"Researcher","foaf:name":[{"@value":"Kenta Takahashi"}]},{"@id":"https://cir.nii.ac.jp/crid/1380021393777244418","@type":"Researcher","foaf:name":[{"@value":"Takahiro Matsuda"}]},{"@id":"https://cir.nii.ac.jp/crid/1380021393777244417","@type":"Researcher","foaf:name":[{"@value":"Takao Murakami"}]},{"@id":"https://cir.nii.ac.jp/crid/1380021393777244288","@type":"Researcher","foaf:name":[{"@value":"Goichiro Hanaoka"}]},{"@id":"https://cir.nii.ac.jp/crid/1380021393777244416","@type":"Researcher","foaf:name":[{"@value":"Masakatsu Nishigaki"}]}],"publication":{"publicationIdentifier":[{"@type":"PISSN","@value":"16155262"},{"@type":"EISSN","@value":"16155270"}],"prism:publicationName":[{"@value":"International Journal of Information Security"}],"dc:publisher":[{"@value":"Springer Science and Business Media LLC"}],"prism:publicationDate":"2019-02-23","prism:volume":"18","prism:number":"5","prism:startingPage":"581","prism:endingPage":"617"},"reviewed":"false","dcterms:accessRights":"http://purl.org/coar/access_right/c_abf2","dc:rights":["https://creativecommons.org/licenses/by/4.0"],"url":[{"@id":"http://link.springer.com/article/10.1007/s10207-019-00428-z/fulltext.html"},{"@id":"http://link.springer.com/content/pdf/10.1007/s10207-019-00428-z.pdf"}],"createdAt":"2019-02-23","modifiedAt":"2022-09-12","relatedProduct":[{"@id":"https://cir.nii.ac.jp/crid/1050589221519209984","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"A Provably Secure Lattice-Based Fuzzy Signature Scheme Using Linear Sketch"}]},{"@id":"https://cir.nii.ac.jp/crid/1360865814734413440","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Fuzzy Signature with Biometric-Independent Verification"}]},{"@id":"https://cir.nii.ac.jp/crid/1390024965201521920","@type":"Article","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"ja","@value":"生体認証をめぐる脅威と対策技術の研究動向"}]},{"@id":"https://cir.nii.ac.jp/crid/1390025960459968384","@type":"Article","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Efficient Accuracy Evaluation Methods for Lattice-Based Fuzzy Extractors and Fuzzy Signatures"}]},{"@id":"https://cir.nii.ac.jp/crid/1390305721537380608","@type":"Article","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"ja","@value":"生体認証技術の研究開発における総合知"},{"@language":"en","@value":"Convergence Knowledge in Research and Development of Biometrics Technologies"}]},{"@id":"https://cir.nii.ac.jp/crid/1390584870600180864","@type":"Article","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@language":"en","@value":"Sample Recoverable Fuzzy Extractors"}]}],"dataSourceIdentifier":[{"@type":"CROSSREF","@value":"10.1007/s10207-019-00428-z"},{"@type":"OPENAIRE","@value":"doi_dedup___::8d7eba81ed23bda02ee7c467ae98045d"},{"@type":"CROSSREF","@value":"10.1109/access.2023.3287777_references_DOI_F4qmFjc55ExM7Sq34wYp1va6EY6"},{"@type":"CROSSREF","@value":"10.1587/transfun.2024cip0012_references_DOI_F4qmFjc55ExM7Sq34wYp1va6EY6"},{"@type":"CROSSREF","@value":"10.1587/bplus.19.224_references_DOI_F4qmFjc55ExM7Sq34wYp1va6EY6"},{"@type":"CROSSREF","@value":"10.1587/transfun.2025cip0008_references_DOI_F4qmFjc55ExM7Sq34wYp1va6EY6"},{"@type":"CROSSREF","@value":"10.1109/biosig58226.2023.10345774_references_DOI_F4qmFjc55ExM7Sq34wYp1va6EY6"},{"@type":"CROSSREF","@value":"10.1587/essfr.19.2_78_references_DOI_F4qmFjc55ExM7Sq34wYp1va6EY6"}]}