Trapdoor Computational Fuzzy Extractors
@article{Herder2014TrapdoorCF, title={Trapdoor Computational Fuzzy Extractors}, author={Charles Herder and Ling Ren and Marten van Dijk and M. Yu and S. Devadas}, journal={IACR Cryptol. ePrint Arch.}, year={2014}, volume={2014}, pages={938} }
We describe a method of cryptographically-secure key extraction from a noisy biometric source. The computational security of our method can be clearly argued through hardness of Learning Parity With Noise (LPN). We use a fuzzy commitment scheme so the extracted key is chosen by definition to have uniformly random bits. The biometric source is used as the noise term in the LPN problem. A key idea in our construction is to use additional ‘confidence’ information produced by the source for… CONTINUE READING
Figures, Tables, and Topics from this paper
10 Citations
Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things
- Computer Science
- IEEE Access
- 2017
- 9
- Highly Influenced
Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2016
- 3
- Highly Influenced
- PDF
PUF-Based Fuzzy Authentication Without Error Correcting Codes
- Engineering, Computer Science
- IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
- 2017
- 18
End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol
- Computer Science
- CHES
- 2015
- 55
- PDF
Iris Biometric Security Challenges and Possible Solutions: For your eyes only?Using the iris as a key
- Computer Science
- IEEE Signal Processing Magazine
- 2015
- 15
- Highly Influenced
Reliable and Modeling Attack Resistant Authentication of Arbiter PUF in FPGA Implementation With Trinary Quadruple Response
- Computer Science
- IEEE Transactions on Information Forensics and Security
- 2019
- 16
Systematic Correlation and Cell Neighborhood Analysis of SRAM PUF for Robust and Unique Key Generation
- Engineering, Computer Science
- J. Hardw. Syst. Secur.
- 2017
- 10
References
SHOWING 1-10 OF 48 REFERENCES
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Computer Science, Mathematics
- SIAM J. Comput.
- 2008
- 1,748
- Highly Influential
- PDF
Entropy loss in PUF-based key generation schemes: The repetition code pitfall
- Mathematics, Computer Science
- 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
- 2014
- 46
- PDF
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
- Mathematics, Computer Science
- CRYPTO
- 2009
- 483
- PDF
Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices
- Mathematics, Computer Science
- Public Key Cryptography
- 2012
- 95
- PDF
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning
- Computer Science
- CHES
- 2011
- 93
- PDF