Abstract
Fuzzy signature () is a type of digital signature that preserves the core functionalities of traditional signatures, while accommodating variations and non-uniformity in the signing key. This property enables the direct use of high-entropy fuzzy data, such as biometric information, as the signing key. In this paper, we define the m-existentially unforgeable under chosen message attack () security of fuzzy signature. Furthermore, we propose a generic construction of fuzzy signature, which is composed of a homomorphic secure sketch () with an error-recoverable property, a homomorphic average-case strong extractor (), and a homomorphic and key-shift* secure signature scheme (). By instantiating the foundational components, we present a secure fuzzy signature instantiation based on the Computational Diffie–Hellman (CDH) assumption over bilinear groups in the standard model.
MSC:
94A60
1. Introduction
1.1. Digital Signature and Fuzzy Signature
A digital signature [1,2] is a fundamental cryptographic primitive that ensures integrity, authentication, and non-repudiation in digital communication. Traditional signature algorithms [3] generally require the signing keys to be uniformly random and precisely accurate. When using a digital signature for authentication, users need to take care to retain their signing key. They may store the signing key on devices such as a smart card [4,5] or a USB token [6,7]. Hence, it is unavoidable for users to carry an additional device.
Fuzzy signature [8] is an advanced digital signature scheme that permits non-uniformity and approximate matching of the signing key. This property enables fuzzy signatures to leverage fuzzy data (e.g., biometric information) as the signing key. Note that the same individual’s biometric information [9,10,11] (e.g., fingerprints, iris scans, and facial features) may vary slightly with each capture due to environmental conditions, equipment differences, and measurement noise. Additionally, the distribution of biometric information is not uniform, but has high entropy.
Fuzzy signature () consists of four algorithms, as depicted in Figure 1. The setup algorithm takes the security parameter as input, and it outputs the public parameters . Given the public parameters and a fuzzy signing key , such as a sample of biometric data, the key-generation algorithm computes the verification key . The signing algorithm takes (a new sample of the same biometric data), a message m, and the public parameters as inputs, and it outputs a signature . The verification algorithm takes , , a message m, and a signature as inputs, and it outputs 1 (valid) or 0 (invalid). The signature is guaranteed to be valid when the signing keys and are sufficiently close.
Figure 1.
Fuzzy signature . The public parameters are omitted for brevity.
The notion of fuzzy signature was first introduced by Takahashi et al. [8]. In their work, they proposed a general construction of fuzzy signature based on a tool called linear sketch and a signature with homomorphic properties regarding keys and signatures. However, their security model assumes that the differences between different samples drawn from identical biometric data are independent of the biometric data itself, which deviates from real-world applications. In addition, their fuzzy signature has a critical limitation: it requires biometric information to be uniformly distributed, a condition that is clearly unrealistic in practical scenarios. Furthermore, their fuzzy signature requires bilinear groups and has large public parameters (proportional to the security parameter), making it less practical for real-world deployment.
Matsuda et al. [12] relaxed the constraints imposed on the underlying linear sketch and homomorphic signature scheme. Through this relaxation, they constructed a new fuzzy signature scheme based on the Schnorr signature scheme [13] and an improved linear sketch. Their construction operates under the assumption that the fuzzy data has high average min-entropy, even in the presence of information leakage. Thanks to the use of the Schnorr signature scheme, their fuzzy signature scheme achieves greater efficiency. Nevertheless, its security is guaranteed only in the random oracle model.
In 2021, Katsumata et al. [14] proposed a simple and efficient generic construction of fuzzy signature based on linear sketch and the tweaked Schnorr signature scheme. In their work, the linear sketch is formalized using lattice theory [15]. The security of the scheme relies on the assumption, which combines the hardness of the discrete logarithm problem (DLP) [16] with the security of the sketch mechanism. Analysis shows that under a low Conditional False Matching Rate (ConFMR), reduces to the standard DLP, and remains unconditionally secure in the generic group model, even for higher ConFMR values. To connect theory with practice, the authors develop a statistical framework using extreme value analysis and t-tests to estimate the ConFMR for real biometric data. However, their fuzzy signature is secure only in the random oracle model [17]. Similarly to previous works, their fuzzy signature requires that the differences between different samples drawn from identical biometric data are independent of the biometric data itself, which is not compatible with real-world applications.
Song et al. [18] introduced a novel security model called -existentially unforgeable under chosen message attack () security for fuzzy signature, which requires only that the fuzzy signing key possesses sufficient entropy [19] and that the error distribution across different biometric samples can be arbitrarily correlated to the biometric data. In addition, they proposed a generic construction of fuzzy signature based on a fuzzy extractor [20] and a signature scheme with a simple key-generation process. By instantiating their framework with different signature schemes, they presented two concrete constructions: one based on the Computational Diffie–Hellman (CDH) assumption [21] in the standard model, and another based on lattice assumptions which is post-quantum secure in the random oracle model.
However, their signature generation algorithm requires the verification key as an additional input, which may impose a usability burden on the user. For instance, consider a scenario where a user signs messages using biometric data (e.g., a fingerprint or iris scan) as the signing key. If is required during signing, the user must securely store and may need to carry an external device (e.g., a smart card or USB token), which introduces usability challenges and potential security risks. Is such a device is compromised, it could undermine the overall security of the system. In contrast, if is not required during the signing process, the user can generate signatures solely based on biometric data, without the need to manage or protect the verification key. This leads to a more practical, user-friendly, and device-free signing experience.
With the advancement of quantum computing, growing attention has been devoted to the development of post-quantum secure cryptographic algorithms. Tian et al. [22] presented a new reusable fuzzy signature based on a reusable fuzzy extractor from LWE [23,24,25] and lattice-based digital signatures [26]. While their fuzzy signature scheme achieves post-quantum security, its security is established in the random oracle model.
In 2023, zheng et al. [27] proposed another efficient quantum-resistant fuzzy signature scheme based on the small integer solution problem (SIS) [28] by employing a modified linear sketch. Although their security proof is more rigorous than that of prior work, it can only be established under the random oracle model.
The aforementioned fuzzy signature schemes typically employ either a linear sketch or a fuzzy extractor as the core technique to bridge the gap between fuzzy biometric data and cryptographic primitives (e.g., signing keys).
A fundamental limitation of fuzzy signature schemes [8,12,14,27] based on linear sketches is the requirement that the errors across different biometric samples are statistically independent of the biometric data itself. This assumption is difficult to justify in practice, as real-world biometric variations are typically correlated with the underlying data, rendering such schemes impractical for real-life applications.
On the other hand, fuzzy extractor–based constructions face their own limitations. For instance, the scheme proposed in [22] is only proven secure in the random oracle model, while the one in [18] requires the verification key as input during signing, which introduces usability and security challenges.
Motivated by these observations, we are naturally led to the following question:
Does there exist a construction of a fuzzy signature scheme that (1) relaxes the assumptions on the distribution of fuzzy data, (2) does not require the verification key as input during signing, and (3) achieves security in the standard model without relying on random oracles?
1.2. Our Contributions
In this work, we provide an affirmative answer to the above question. The principal contributions of our work are as follows:
- –
- First, we redefine the notion of fuzzy signature and propose a new security model, which we call -existential unforgeability under chosen-message attack (), for fuzzy signatures. Compared with previous work [18], this new definition eliminates the requirement for the signing algorithm to take a verification key as input, thereby reducing the burden on users to maintain the verification key. Furthermore, our new security model is stronger than the one proposed by Matsuda et al. [12], because our security model allows the adversary to determine the differences between different biometric samples.
- –
- We formally define the error-recoverable property of the secure sketch and show that the syndrome-based secure sketch possesses the error recoverable property. We redefine the homomorphic property and define the key-shift* security of the signature scheme. In our key-shift* security model, the adversary can modify not only the signing key , but also the verification key . We also prove that the Waters signature scheme is homomorphic and key-shift* secure.
- –
- We present a generic construction of a fuzzy signature scheme, built upon three core primitives: a homomorphic secure sketch () with error recovery, a homomorphic average-case strong extractor (), and a homomorphic signature scheme () satisfying key-shift security.
- –
- Instantiating these primitives yields a fuzzy signature scheme that achieves security under the Computational Diffie–Hellman (CDH) assumption in the standard model over bilinear groups, and, notably, does not require the verification key as input to the signing algorithm.
In Table 1, we present an overview of our constructions compared with existing fuzzy signature schemes.
Table 1.
An overview of representative fuzzy signature schemes. “” is the abbreviation of fuzzy signature scheme. “Method” represents the primary cryptographic primitive utilized in the construction of . “Correlation” explains the relationship between the error distribution e and the biometric information W, where e captures the deviation between the fuzzy signing key and (i.e., two readings derived from identical biometric input W). “” indicates that the signing algorithm does not need as input. “Assumption” specifies the cryptographic assumption underlying the . “Standard Model” asks whether the achieves security in the standard model.
1.3. Our Approach
Our generic construction of fuzzy signature consists of a homomorphic secure sketch with an error-recoverable property, a homomorphic average-case strong extractor, and a with a homomorphic property and a simple key-generation process.
In the setup algorithm , the seed i of extractor and public parameters , generated by the underlying signature scheme’s setup algorithm , serve as the public parameters of the entire fuzzy signature . In the key-generation algorithm , the public parameters and a biometric sample are taken as input, and the verification key of is generated. Specifically, is first computed by the sketch generation algorithm to produce a sketch , and then the extractor is used to extract the secret key from for the underlying signature scheme (). Subsequently, the ’s simple key-generation process enables the verification key of the to be derived. Therefore, the final verification key of the is given by .
The signing algorithm uses a new biometric sample as the signing key of fuzzy signature to sign the message m. Specifically, the process begins by computing a new sketch from , while the extractor is used to extract the new as the secret key (signing key) for the underlying signature scheme . Subsequently, the message m and the sketch are signed together using the to obtain . The final signature is then given by . In , utilizing the values of and generated during the and , the error-recovery property of allows us to compute . This enables the extractor to calculate . Next, thanks to the homomorphic property of the , we can obtain the verification key corresponding to , thereby ensuring the correctness of . Consequently, the correctness of the entire fuzzy signature scheme is also guaranteed. In addition, the security of our is ensured by and . More precisely, the security of guarantees the uniform randomness of the secret key in , thereby guaranteeing the security of . Furthermore, the security we defined for can be reduced to the key-shift* security of , which is further guaranteed by the homomorphic property and EUF-CMA security of . Detailed information on this is presented in Section 4.
2. Preliminaries
Throughout this paper, we denote the set of integers by and the set of real numbers by . The notation “” denotes a deterministic assignment of the value v to the variable u. Given a finite set , we use to indicate that d is drawn uniformly at random from . The cardinality of a set is denoted by . For any bit strings a and b, we write for the bit-length of a, and write to denote the concatenation of a and b. A probabilistic algorithm that operates in polynomial time is referred to as a algorithm. For a natural number k, we write for the index set . Let be a randomized procedure; we express to represent the outcome when is executed on input x with internal randomness r. A function is called negligible if for every positive polynomial , there exists an integer , such that for all , it holds that .
2.1. Metric Spaces
Definition 1 (Metric Space [29]).
A metric space is a set equipped with a distance function , where satisfies the following properties for all :
- (i)
- if, and only if, ;
- (ii)
- (symmetry);
- (iii)
- (triangle inequality).
2.2. Min-Entropy and Statistical Distance
Definition 2 (Min-Entropy [29]).
Let ξ be a discrete random variable over a finite set . The min-entropy of ξ is defined as
Definition 3 (Average Min-Entropy [20]).
Let A and B be two discrete random variables over finite sets and , respectively. The average min-entropy of A given B is defined as
Definition 4 (Statistical Distance [20]).
Let U and V be two random variables taking values in a finite set . The statistical distance between U and V is defined as
2.3. Computational Diffie–Hellman (CDH) Assumption
Let be an algorithm that outputs , where is a cyclic group with order p, and is a generator.
Definition 5 (CDH Problem).
Given the four-tuple , compute , where and .
Definition 6 (CDH Assumption).
The CDH assumption w.r.t. is ϵ-hard if, for any PPT adversary , the following holds:
where and .
2.4. Secure Sketch and Average-Case Strong Extractor
Definition 7 (Secure Sketch [20]).
A -secure sketch consists of two efficient algorithms, defined as follows:
- –
- on input , outputs a sketch .
- –
- on input and a sketch , outputs a recovered value .
These algorithms must satisfy the following properties:
- –
- When , then .
- –
- For any distribution W over , if , .
A secure sketch is regarded as homomorphic if for all , it holds that
Definition 8 (Error-Recoverable Property).
Let be a -secure sketch and , such that . Let and , . We say that the secure sketch has the error-recoverable property if there is a deterministic function , such that .
Remark 1.
In our fuzzy signature scheme, the user needs to compute the error between the fuzzy data sampled during the generation of the verification key and used for signing, by utilizing the values and . Here, is included in the verification key, while is part of the signature. Through this mechanism, the scheme can verify the validity of the signature. The details can be found in Section 4 of our paper. The error-recoverable property ensures that the user can perform the above operations reliably.
Lemma 1.
The error-recoverable property mentioned above is satisfied by the syndrome-based secure sketch construction.
Proof.
This lemma is a straightforward consequence of the inherent properties of the syndrome-based secure sketch construction [20]. Recall that the syndrome-based secure sketch is as follows. The generation algorithm , and the recovery algorithm , where is an efficient and deterministic function to find the unique , where such that . By the correctness of the secure sketch, if , then . It is obvious that . The lemma follows. □
For completeness, we provide the details of the syndrome-based secure sketch in Appendix A.
Definition 9 (Average-Case Strong Extractor [20]).
A function is called an average-case -strong extractor with randomness if for every random variable W over and any auxiliary information Z, the following holds:
where R and U are independently and uniformly sampled from and , respectively.
Definition 10 (Homomorphic Average-Case Strong Extractor).
An average-case -strong extractor is said to be homomorphic if for all and all seeds , it satisfies
One instantiation of an average-case strong extractor [30] is defined as follows:
where denotes the seed, and represents the input. Note that
Then we have that Equation (1) is a homomorphic average-case strong extractor.
2.5. Signature Scheme
Definition 11 (Signature Scheme).
A digital signature scheme consists of four probabilistic polynomial-time (PPT) algorithms.
- : On input the security parameter λ, outputs public parameters .
- : On input , generates a key pair consisting of a verification key and a signing key .
- : On input , , and a message , outputs a signature σ.
- : On input , , m, and σ, outputs a bit indicating whether the signature is valid (1) or invalid (0).
Correctness.
For any message , let , , and signature ; then
Definition 12 (EUF-CMA Security).
We say that a digital signature achieves existentially unforgeable under adaptive chosen-message attack (EUF-CMA) security if for any PPT adversary, it holds that
where is defined as follows.
:
- 1.
- The challenger runs , generates , initializes an empty query set , and sends and to the adversary .
- 2.
- Throughout the experiment, may adaptively query a signing oracle:
- submits a message to .
- computes , adds to , and returns to .
- 3.
- Finally, outputs a forgery . The experiment outputs 1 if, and only if,Otherwise, it outputs 0.
Definition 13
(Simple Key-Generation Process [8]). We say that a digital signature scheme supports a simple key-generation process if the public parameters implicitly define the signing key space , and there exists a deterministic polynomial-time () algorithm such that is functionally equivalent to the following procedure:
Definition 14 (Homomorphic Signature).
A signature scheme , equipped with a simple key-generation process , is said to be homomorphic if the following properties are satisfied:
- 1.
- For all , the signing key space constitutes an abelian group .
- 2.
- For all , there exists a deterministic and efficient algorithm such thatwhere , .
- 3.
- Suppose the random space of the signing algorithm is . For all , and , there exists a deterministic and efficient algorithm such thatwhere , .
Remark 2.
For simplicity, we sometimes omit r and say that there exists a deterministic and efficient algorithm such that
where , .
Remark 3.
Our definition of a homomorphic signature differs from the definition provided in [8] in three aspects.
- 1.
- The first difference lies in the inputs required by the algorithm . In our definition, takes as input and generates a valid signature of m under the signing key . However, in [8], the algorithm additionally requires as part of its input.
- 2.
- The second difference is that in our definition with the same random number r, while in [8], the distribution of and is required to be identical.
- 3.
- The third difference is that our definition omits the requirement that for all and all pairs satisfying , it holds that .
Next, we will formally define the key-shift* security of a signature scheme. In the traditional related-key attack (RKA) security experiment [31], only the signing key can be changed by the adversary . More precisely, the adversary is allowed to modify the secret key using a predefined set of transformations, and obtains signatures under the modified keys on adaptively chosen messages, while the verification key remains unchanged. The adversary’s goal is to produce a valid forgery—a message–signature pair —such that verifies correctly under the corresponding verification key . If the adversary succeeds in producing such a forgery, it is said to have broken the scheme under related-key attacks. These transformations can include various functions, such as affine transformations, bitwise operations, or other structured modifications. A more detailed RKA security definition is given in Appendix B.
The key-shift security notion is a special case of RKA security, in which the adversary is restricted to applying only additive shifts to the secret key. That is, the adversary can choose a shift value and obtain signatures under .
Our proposed key-shift* security strengthens the key-shift model by also allowing the adversary to submit not only a forged message–signature pair , but also a corresponding secret key shift . The adversary succeeds if the signature verifies correctly with respect to the verification key associated with the shifted secret key . This captures a stronger adversarial capability and provides a more refined security guarantee in settings where both the signing and verification keys may be subject to related-key manipulations.
Definition 15 (Key-Shift* Security).
A signature scheme with a simple key-generation process is key-shift* secure if for all adversaries , it holds that
where is defined as follows.
:
- 1.
- The challenger runs , generates , initializes an empty query set , and sends and to the adversary .
- 2.
- Throughout the experiment, may adaptively query a signing oracle with pairs , where and is a key shift:
- submits to .
- computes the signature , adds to , and returns to .
- 3.
- Finally, outputs a forgery and a final shift . The experiment outputs 1 if, and only if,Otherwise, it outputs 0.
Remark 4.
Compared to standard key-shift security, key-shift* security captures a stronger adversarial capability. In this work, key-shift* security is specifically designed to support the construction of fuzzy signature schemes, where secret keys are often derived from noisy or biometric data that may vary across different uses.
Lemma 2.
Let be a signature scheme with a simple key-generation process and a signing key space . If is EUF-CMA secure and homomorphic, then is key-shift* secure.
Proof.
We prove the key-shift* security of via a reduction to its EUF-CMA security, leveraging the homomorphic property of the scheme . Suppose there exists a probabilistic polynomial-time (PPT) adversary that breaks the key-shift* security of with a non-negligible advantage. Then, we construct a new adversary that uses as a subroutine to break the EUF-CMA security of .
The adversary interacts with its own EUF-CMA challenger and simulates the key-shift* experiment for as follows:
- Upon receiving the public parameters and verification key from its EUF-CMA challenger, forwards to .
- For each j-th signing query made by , proceeds as follows:
- queries its signing oracle on and receives a signature .
- computes using the homomorphic signing algorithm, and returns to .
- In the final phase, when outputs a forgery and a shift , computesand submits to its challenger. then outputs whatever its challenger returns.
We now argue that the simulation is perfect. By the homomorphic property of , we have
where . Therefore, the signatures returned by are distributed identically to those in the real key-shift* experiment.
Next, we will show that has the same advantage of .
Note that if ’s forgery is valid under the shifted key , i.e.,
by the homomorphic property, we have
This implies that is a valid signature of under the signing key . As a result, if wins the key-shift* experiment, then wins the EUF-CMA experiment. So we have
□
3. Fuzzy Signature
A fuzzy signature scheme differs from a traditional digital signature scheme in that the signing key is no longer required to be uniformly random or precisely reproducible. Instead, the signing key in a fuzzy signature can be any high-entropy fuzzy data, such as biometric inputs (e.g., facial scans or fingerprints). The key-generation algorithm takes a fuzzy signing key (e.g., an initial facial scan) and outputs a verification key . Any signature generated using (e.g., a later facial scan of the same person) will verify successfully under , provided that and are sufficiently close according to an appropriate distance metric. Below, we formally define a fuzzy signature scheme .
Definition 16(Fuzzy Signature).
Let be the fuzzy signing key space, the message space, and a threshold parameter governing the acceptable distance between keys. A -fuzzy signature scheme consists of four probabilistic polynomial-time () algorithms:
- . Upon input of the security parameter , this algorithm outputs public parameters .
- . Given the public parameters and a fuzzy signing key (e.g., a biometric template), this algorithm generates a verification key .
- . To sign a message , the signer uses a (possibly different) fuzzy key close to the original , along with , to produce a signature .
- , where . This algorithm checks the validity of the signature on message m under the verification key and public parameters , returning 1 if valid and 0 otherwise.
Correctness.
For any , , if , , , , we have
Next, we present a new security model in which the adversary can adaptively determine the differences between biometric samples.
Definition 17
( Security). A -fuzzy signature scheme is said to be -existentially unforgeable under adaptive chosen-message attacks secure (-EUF-) if no efficient adversary can produce a valid forgery with non-negligible probability when the signing key is sampled from an arbitrary distribution W over with min-entropy of at least , i.e., .
Formally, for all probabilistic polynomial-time (PPT) adversaries , we require that
where is defined as follows.
:
- 1.
- The challenger runs ; samples a signing key , where W is a distribution over with ; computes ; and initializes an empty query set . Next, it returns and to .
- 2.
- Over the course of the experiment, is allowed to adaptively make signing oracle queries in the following form:
- sends a message and a shift to .
- If , returns ⊥ (invalid shift). Else, invokes , adds to the query set , and returns to .
- 3.
- In the final phase, outputs a forgery . The experiment returns 1 if ; otherwise, it returns 0.
Remark 5.
In our security model, the shift between different samples of the same noisy source is adaptively chosen by the adversary . Note that, before the adversary submits a shift , the adversary has received , and . Since and are dependent on W, can be dependent on W. However, due to ’s limited computational ability, the shift cannot depend on the biometric data in an arbitrary manner. Nevertheless, our security model is still stronger than the security model in [12], which requires the errors between different samples to be independent of the noisy source.
Remark 6.
From a theoretical perspective, the adversary-selected shift model subsumes the scenario of independent errors, provided that the adversary chooses the shifts randomly and independently. From a practical perspective, however, we argue that modeling only independent errors may not be sufficient to capture real-world threats. For instance, in biometric-based systems, an adversary could manipulate the sampling device to deterministically flip or fix certain bits of the biometric data. Consider, for example, the i-th bit of the biometric template:
- If the original bit is 1, it remains unchanged.
- If the original bit is 0, it is flipped to 1.
This type of deterministic bit manipulation cannot be captured by independent random-error models, as the error is not random, but depends on the biometric template. In contrast, our adversary-selected shift model is specifically designed to account for such scenarios, thereby providing a stronger and more realistic security guarantee in the presence of active and targeted distortions.
4. Construction of Fuzzy Signature
4.1. Construction
Our fuzzy signature scheme , which is depicted in Figure 2, is composed of the following building blocks.
Figure 2.
Generic construction of fuzzy signature scheme .
- A homomorphic -secure sketch with a sketching space that satisfies the error-recoverable property.
- A key-shift* secure and homomorphic with a secret key space and a message space .
- A homomorphic average-case -strong extractor with seed space .
For better clarity and understanding of our construction, we have added Figure 3 to visually depict the key components and their interactions.
Figure 3.
An overview of our construction of fuzzy signature. We have omitted for brevity.
4.2. Correctness
Theorem 1.
If is a homomorphic -secure sketch with a sketch space and the error-recoverable property, is a homomorphic average-case -strong extractor with a seed space , and the signature scheme is homomorphic with the secret key space and message space , then the constructed fuzzy signature scheme is correct.
Proof.
To establish the correctness of the fuzzy signature scheme, we need to show that for any and , if , the verification algorithm accepts the signature. Specifically, it holds that , where , , and .
Note that verification algorithm accepts the signature if, and only if, the underlying signature scheme successfully verifies. That is, , where , , , and .
By the correctness of the underlying signature , if , then , since . So we need to prove that if , .
Recall that , , , where and . Due to the the error-recoverable property of the secure sketch , for any , if , it holds that .
Due to the homomorphic property of , we have
Similarly, due to the homomorphic property of , it follows that
As a result, the fuzzy signature scheme is correct. □
4.3. Security
Theorem 2.
If is a homomorphic -secure sketch with a sketching space and it satisfies the error-recoverable property, is a homomorphic average-case -strong extractor with a seed space , is a homomorphic signature scheme with a secret key space , message space and key-shift* security, then the construction of fuzzy signature in Figure 2 is a -fuzzy signature satisfying security. In addition,
Proof.
Let be an arbitrary PPT adversary that attacks the security of fuzzy signature . We will prove this theorem by a sequence of games, where the first game Game 0 is the original game . For , let denote the event that wins (i.e., the experiment returns 1) in Game . Our goal is to show that is negligible. Differences between adjacent games are highlighted with underline.
Game 0.
Game 0 is identical to the -EUF- experiment . Specifically, it proceeds as follows:
- Challenger samples , invokes , sets , then samples , computes , , , and sets . Next, it initializes the query set , which denotes the set of queries selected by . Afterwards, returns to .
- The adversary may adaptively make signing queries.
- submits a message and a shift to .
- If , returns ⊥. Else, parses , invokes and , then sets , invokes , sets , adds to the set , and returns to .
- Finally, submits a forgery . parses , , , then sets , and computes , and . If , the experiment outputs 1; else, it outputs 0.Obviously,
Game 1.
This game behaves equivalently to Game 0, apart from some conceptual changes. More precisely,
- The adversary may adaptively make signing queries.
- submits a message and a shift to .
- If , returns ⊥. Else, parses , invokes and , then sets , invokes , sets , adds to the set , and returns to .
Lemma 3.
.
Proof.
Due to the homomorphic property of , it follows that
Similarly, due to the homomorphic property of , it follows that
Therefore, in both games, the signing key and the sketch used in response to each query are computed correctly according to the homomorphic property. Since all oracle responses are identically distributed in and , it follows that . The lemma is thus established. □
Game 2.
This game is identical to Game 1, except that in step 1, is uniformly chosen from other than . More specifically,
- Challenger samples , invokes , sets , then samples , computes , randomly chooses , computes , and sets . Next, it initializes the query set , which denotes the set of queries selected by . Afterwards, returns to .
Lemma 4.
.
Proof.
Note that ; by the security of the -secure sketch, we have . Since is a average-case -strong extractor with a seed space , then we have
where .
Next we show that if there exists an adversary that the difference between the probability of winning in Game 1 and the probability of winning in Game 2 is non-negligible, then we can construct an algorithm that can distinguish and with a non-negligible advantage. Assume that is given , where d is either or an element . The aim of is to tell which case it is. Adversary proceeds as follows:
- invokes , sets , then sets , computes , and sets . Next, it initializes the query set , which denotes the set of queries selected by . Afterwards, returns to .
- may adaptively interact with the signing oracle in the following manner.
- submits a message and a shift to .
- If , returns ⊥. Else, parses , invokes and , then sets , invokes , sets , adds to the set , and returns to .
- In the finalization phase, outputs a forgery . parses , , , then sets , and computes , , and . If , returns 1; else, returns 0.
If , then accurately simulates Game 1 for ; if , where , then perfectly simulates Game 2 for . As a result, we have
The lemma follows. □
Lemma 5
Proof.
We prove this lemma by showing that if there exists a PPT adversary who wins in Game 2, then we can construct a PPT adversary who can win in the key-shift* experiment of the underlying signature .
- Upon receiving from its key-shift* challenger, samples , , then calculates , sets , and returns to adversary .
- When makes a signing query on , responds to ’s query in the following manner:
- If , returns ⊥. Else, computes and , sets , and sends to its key-shift* challenger.
- Upon receiving from its key-shift* challenger, sets and returns to .
- In the finalization phase, outputs a forgery to . parses , sets , computes and , submits and a shift to its challenger, and returns what its challenger returns.
It is obvious that perfectly simulates Game 2 for . As a result, if wins in Game 2, then wins the key-shift* experiment. Consequently,
□
Taking Equation (2) and Lemmas 3–5 together, we have
Theorem 2 follows.
5. Instantiation
In this section, we instantiate the generic construction presented in Section 4 using the Waters signature scheme. We choose the Waters signature scheme for this instantiation as it is one of the few schemes that simultaneously supports both the homomorphic property and key-shift* security—two desirable features that are seldom found together in existing signature schemes. To this end, we first recall , as depicted in Figure 4. Subsequently, we prove that is both homomorphic and key-shift* secure.
Figure 4.
Waters signature scheme .
Waters [32] proved that the Waters signature scheme is EUF-CMA secure under the computational Diffie-Hellman (CDH) assumption in (Further details regarding can be found in Appendix C).
Theorem 3
([32,33]). Suppose there exists a forger that -breaks the EUF-CMA security of . Then, there exists an algorithm -solving the computational Diffie–Hellman problem in in time with success probability .
Lemma 6.
is homomorphic. More precisely,
Proof.
We now show that is homomorphic by demonstrating that it satisfies Definition 14. It is straightforward to see that has a simple key-generation process,
- Note that The signing key space , equipped with addition modulo p, constitutes an abelian group.
- Note that , so there exsits a deterministic and efficient algorithm , such that
- Given a message M and a fixed random number , the signature of M under signing key with random number r isThe signature of M under signing key with the same random number r isNote thatandSo there exisits a deterministic and efficient algorithm , such thatThe lemma follows. □
It follows from Theorem 3 that achieves EUF-CMA security under the CDH assumption. Moreover, Lemma 6 demonstrates that possesses the homomorphic property. In addition, Lemma 2 states that any signature scheme that is both homomorphic and EUF-CMA secure also satisfies key- security. Therefore, by combining Theorem 3, Lemma 6, and Lemma 2, we derive the following corollary.
Corollary 1.
is key- secure under the computational Diffie–Hellman (CDH) assumption in .
We use the homomorphic average-case strong extractor in Equation (1), the syndrome-based secure sketch introduced in Section 2.4, and the Waters signature scheme as fundamental components to instantiate the generic construction presented in Figure 2. The detailed construction is illustrated in Figure 5. This results in a fuzzy signature scheme that is secure under the CDH assumption over a bilinear group in the standard model. Moreover, the signing algorithm of this scheme does not require the verification key as extra input.
Figure 5.
Instantiation of fuzzy signature scheme from secure sketch.
Corollary 2.
The instantiation illustrated in Figure 5 constitutes a -, for which -EUF- security is established in the standard model, assuming the hardness of the CDH problem in bilinear groups.
6. Future Work
One main limitation of our scheme is its reliance on pairing operations, which may impact efficiency in practice. Constructing a more efficient fuzzy signature scheme—potentially based on alternative assumptions such as lattices or hash-based primitives—is an important direction for future work.
Moreover, while our security model allows the adversary to choose errors adaptively, designing a fuzzy signature scheme in which the errors can be arbitrarily correlated with the biometric data itself remains an open and challenging problem.
Author Contributions
Conceptualization, Y.W.; Methodology, Y.W. and W.L.; Validation, T.J.; Investigation, T.J.; Writing—original draft, Y.W. and T.J.; Writing—review & editing, Y.W. and W.L.; Supervision, Y.W. and W.L. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by National Natural Science Foundation of China (Grant No. 62102077) and the Shanghai Natural Science Foundation (Grant No. 24ZR1401300).
Data Availability Statement
Data are contained within the article.
Acknowledgments
We appreciate the editors and reviewers for their time and consideration in evaluating this paper.
Conflicts of Interest
The authors declare no conflicts of interest.
Appendix A. Syndrome-Based Secure Sketch
Recall that an efficiently decodable linear error-correcting code can correct up to t errors. This code is a linear subspace of with dimension k. The parity-check matrix H of is an matrix whose rows span the orthogonal space . For any vector , the syndrome of is defined as
It is easy to verify that
For any codeword and error vector e, we have
A linear error-correcting code implies a syndrome-based secure sketch [20], which operates as follows:
- Secure Sketch (SS):
- Reconstruction (Rec):
Appendix B. RKA Security
Here, we revisit the definition of RKA security for signature schemes, as proposed by Bellare et al. [31].
Definition A1 (RKA Security).
A signature scheme is Φ-RKA secure if for all adversaries , it holds that
where , defined as follows, is an experiment played between an adversary and a challenger .
:
- 1.
- The challenger runs , computes , then initializes , which denotes the set of queries selected by . Afterwards, returns and to .
- 2.
- Over the course of the experiment, is allowed to adaptively make signing oracle queries in the following form:
- sends a message and a funcition to the challenger .
- computes , adds to the query set , and replies to with .
- 3.
- In the final phase, outputs a candidate forgery in the form of a message–signature pair . The experiment returns 1 if ; otherwise, it returns 0.
Appendix C. Bilinear Groups
We define a tuple to be a symmetric bilinear group if the following conditions are satisfied:
- p is a prime number;
- and are cyclic groups of order p;
- g is a generator of ;
- is a bilinear map computable in time polynomial in , satisfying the following:
- –
- Bilinearity: For all and , we have
- –
- Non-degeneracy: For all generators g of , is not the identity in .
For simplicity, we let denote an algorithm—known as a “bilinear group generator”—which, on input , returns a bilinear group description such that .
References
- Kaur, R.; Kaur, A. Digital signature. In Proceedings of the 2012 International Conference on Computing Sciences, Phagwara, India, 14–15 September 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 295–301. [Google Scholar] [CrossRef]
- Yin, H.L.; Fu, Y.; Li, C.L.; Weng, C.X.; Li, B.H.; Gu, J.; Lu, Y.S.; Huang, S.; Chen, Z.B. Experimental quantum secure network with digital signatures and encryption. Natl. Sci. Rev. 2023, 10, nwac228. [Google Scholar] [CrossRef] [PubMed]
- Alzubi, J.A. Blockchain-based Lamport Merkle digital signature: Authentication tool in IoT healthcare. Comput. Commun. 2021, 170, 200–208. [Google Scholar] [CrossRef]
- Jiang, Q.; Ma, J.; Li, G.; Li, X. Improvement of robust smart-card-based password authentication scheme. Int. J. Commun. Syst. 2015, 28, 383–393. [Google Scholar] [CrossRef]
- Lu, H.K. Network smart card review and analysis. Comput. Netw. 2007, 51, 2234–2248. [Google Scholar] [CrossRef]
- Wala’a, M.A.; Abusaimeh, H. Modified USB Security Token for User Authentication. Comput. Inf. Sci. 2015, 8, 51–63. [Google Scholar] [CrossRef]
- Jiang, L.; Li, X.; Cheng, L.; Guo, D. Identity authentication scheme of cloud storage for user anonymity via USB token. In Proceedings of the 2013 International Conference on Anti-Counterfeiting, Security and Identification (ASID), Shanghai, China, 25–27 October 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 1–6. [Google Scholar] [CrossRef]
- Takahashi, K.; Matsuda, T.; Murakami, T.; Hanaoka, G.; Nishigaki, M. A signature scheme with a fuzzy private key. In Applied Cryptography and Network Security, Proceedings of the International Conference on Applied Cryptography and Network Security, New York, NY, USA, 2–5 June 2015; Malkin, T., Kolesnikov, V., Lewko, A., Polychronakis, M., Eds.; LNCS; Springer: Cham, Switzerland, 2015; Volume 9092, pp. 105–126. [Google Scholar] [CrossRef]
- Tan, J.; Bauer, L.; Bonneau, J.; Cranor, L.F.; Thomas, J.; Ur, B. Can Unicorns Help Users Compare Crypto Key Fingerprints? In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, CHI’17, Denver, CO, USA, 6–11 May 2017; Association for Computing Machinery: New York, NY, USA, 2017; pp. 3787–3798. [Google Scholar] [CrossRef]
- Yoon, S.; Jain, A.K. Longitudinal study of fingerprint recognition. Proc. Natl. Acad. Sci. USA 2015, 112, 8555–8560. [Google Scholar] [CrossRef]
- Omolara, A.E.; Jantan, A.; Abiodun, O.I.; Arshad, H.; Mohamed, N.A. Fingereye: Improvising security and optimizing ATM transaction time based on iris-scan authentication. Int. J. Electr. Comput. Eng. 2019, 9, 1879–1886. [Google Scholar] [CrossRef]
- Matsuda, T.; Takahashi, K.; Murakami, T.; Hanaoka, G. Fuzzy signatures: Relaxing requirements and a new construction. In Applied Cryptography and Network Security, Proceedings of the International Conference on Applied Cryptography and Network Security, Guildford, UK, 19–22 June 2016; Manulis, M., Sadeghi, A.R., Schneider, S., Eds.; LNCS; Springer: Cham, Switzerland, 2016; Volume 9696, pp. 97–116. [Google Scholar] [CrossRef]
- Schnorr, C.P. Efficient identification and signatures for smart cards. In Advances in Cryptology—CRYPTO’ 89 Proceedings, Proceedings of the 9th Annual International Cryptology Conference, Santa Barbara, CA, USA, 20–24 August 1989; Brassard, G., Ed.; LNCS; Springer: Cham, Switzerland, 1990; Volume 435, pp. 239–252. [Google Scholar] [CrossRef]
- Katsumata, S.; Matsuda, T.; Nakamura, W.; Ohara, K.; Takahashi, K. Revisiting fuzzy signatures: Towards a more risk-free cryptographic authentication system based on biometrics. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, CCS ’21, Virtual, 15–19 November 2021; Association for Computing Machinery: New York, NY, USA, 2021; pp. 2046–2065. [Google Scholar] [CrossRef]
- Peikert, C. A decade of lattice cryptography. Found. Trends® Theor. Comput. Sci. 2016, 10, 283–424. [Google Scholar] [CrossRef]
- Odlyzko, A. Discrete logarithms in finite fields and their cryptographic significance. In Advances in Cryptology, Proceedings of the Workshop on the Theory and Application of of Cryptographic Techniques, Paris, France, 9–11 April 1984; Beth, T., Cot, N., Ingemarsson, I., Eds.; LNCS; Springer: Cham, Switzerland, 1984; Volume 209, pp. 224–314. [Google Scholar] [CrossRef]
- Koblitz, N.; Menezes, A.J. The random oracle model: A twenty-year retrospective. Des. Codes Cryptogr. 2015, 77, 587–610. [Google Scholar] [CrossRef]
- Song, J.; Wen, Y. A generic construction of fuzzy signature. In Information Security and Cryptology, Proceedings of the International Conference on Information Security and Cryptology, Virtual,12–14 August 2021; Yu, Y., Yung, M., Eds.; LNCS; Springer: Cham, Switzerland, 2021; Volume 13007, pp. 23–41. [Google Scholar] [CrossRef]
- Bein, B. Entropy. Best Pract. Res. Clin. Anaesthesiol. 2006, 20, 101–109. [Google Scholar] [CrossRef] [PubMed]
- Dodis, Y.; Reyzin, L.; Smith, A.D. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In EUROCRYPT 2004, Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2–6 May 2004; Cachin, C., Camenisch, J., Eds.; LNCS; Springer: Cham, Switzerland, 2004; Volume 3027, pp. 523–540. [Google Scholar] [CrossRef]
- Joux, A.; Nguyen, K. Separating decision Diffie–Hellman from computational Diffie–Hellman in cryptographic groups. J. Cryptol. 2003, 16, 239–247. [Google Scholar] [CrossRef]
- Tian, Y.; Li, Y.; Deng, R.; Sengupta, B.; Yang, G. Lattice-based remote user authentication from reusable fuzzy signature. J. Comput. Secur. 2021, 29, 273–298. [Google Scholar] [CrossRef]
- Apon, D.; Cho, C.; Eldefrawy, K.; Katz, J. Efficient, reusable fuzzy extractors from LWE. In Cyber Security Cryptography and Machine Learning, Proceedings of the first International Conference, CSCML 2017, Beer-Sheva, Israel, 29–30 June 2017; Dolev, S., Lodha, S., Eds.; LNCS; Springer: Cham, Switzerland, 2017; Volume 10332, pp. 1–18. [Google Scholar] [CrossRef]
- Wen, Y.; Liu, S. Reusable fuzzy extractor from LWE. In Information Security and Privacy, Proceedings of the ACISP 2018, Wollongong, NSW, Australia, 11–13 July 2018; Susilo, W., Yang, G., Eds.; LNCS; Springer: Cham, Switzerland, 2018; Volume 10946, pp. 13–27. [Google Scholar] [CrossRef]
- Zhou, Y.; Liu, S.; Han, S. Robustly Reusable Fuzzy Extractor from Isogeny. Theor. Comput. Sci. 2024, 1008, 114677. [Google Scholar] [CrossRef]
- Lyubashevsky, V. Lattice signatures without trapdoors. In Advances in Cryptology—EUROCRYPT 2012, Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, 15–19 April 2012; Springer: Cham, Switzerland, 2012; Volume 7237, pp. 738–755. [Google Scholar] [CrossRef]
- Zheng, M.; Liu, Z.; Mambo, M. A Provably Secure Lattice-Based Fuzzy Signature Scheme Using Linear Sketch. IEEE Access 2023, 11, 62510–62521. [Google Scholar] [CrossRef]
- Wang, S.; Zhu, Y.; Ma, D.; Feng, R. Lattice-based key exchange on small integer solution problem. Sci. China Inf. Sci. 2014, 57, 1–12. [Google Scholar] [CrossRef]
- Wen, Y.; Liu, S. Robustly reusable fuzzy extractor from standard assumptions. In Advances in Cryptology—ASIACRYPT 2018, Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, 2–6 December 2018; Peyrin, T., Galbraith, S., Eds.; LNCS; Springer: Cham, Switzerland, 2018; Volume 11274, pp. 459–489. [Google Scholar] [CrossRef]
- Shoup, V. A Computational Introduction to Number Theory and Algebra; Cambridge University Press: Cambridge, UK, 2006. [Google Scholar]
- Bellare, M.; Cash, D.; Miller, R. Cryptography Secure against Related-Key Attacks and Tampering. In Advances in Cryptology—ASIACRYPT 2011, Proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, Republic of Korea, 4–8 December 2011; Lee, D.H., Wang, X., Eds.; Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2011; Volume 7073, pp. 486–503. [Google Scholar] [CrossRef]
- Waters, B. Efficient identity-based encryption without random oracles. In Advances in Cryptology—EUROCRYPT 2005, Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 22–26 May 2005; Springer: Cham, Switzerland, 2005; Volume 3494, pp. 114–127. [Google Scholar] [CrossRef]
- Hofheinz, D.; Jager, T.; Knapp, E. Waters Signatures with Optimal Security Reduction. In Public Key Cryptography—PKC 2012, Proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,21–23 May 2012; Fischlin, M., Buchmann, J., Manulis, M., Eds.; Springer: Cham, Switzerland, 2012; Volume 7293, pp. 66–83. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).




