Corpus ID: 14156919

Trapdoor Computational Fuzzy Extractors

@article{Herder2014TrapdoorCF,
  title={Trapdoor Computational Fuzzy Extractors},
  author={Charles Herder and Ling Ren and Marten van Dijk and M. Yu and S. Devadas},
  journal={IACR Cryptol. ePrint Arch.},
  year={2014},
  volume={2014},
  pages={938}
}
  • Charles Herder, Ling Ren, +2 authors S. Devadas
  • Published 2014
  • Computer Science
  • IACR Cryptol. ePrint Arch.
  • We describe a method of cryptographically-secure key extraction from a noisy biometric source. The computational security of our method can be clearly argued through hardness of Learning Parity With Noise (LPN). We use a fuzzy commitment scheme so the extracted key is chosen by definition to have uniformly random bits. The biometric source is used as the noise term in the LPN problem. A key idea in our construction is to use additional ‘confidence’ information produced by the source for… CONTINUE READING
    10 Citations
    Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things
    • 9
    • Highly Influenced
    Strong key derivation from noisy sources
    • 1
    Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT
    • 3
    • Highly Influenced
    • PDF
    Iris Biometric Security Challenges and Possible Solutions
    • 2
    • Highly Influenced
    • PDF
    PUF-Based Fuzzy Authentication Without Error Correcting Codes
    • 18
    End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol
    • 55
    • PDF
    Iris Biometric Security Challenges and Possible Solutions: For your eyes only?Using the iris as a key
    • 15
    • Highly Influenced
    Reliable and Modeling Attack Resistant Authentication of Arbiter PUF in FPGA Implementation With Trinary Quadruple Response
    • 16

    References

    SHOWING 1-10 OF 48 REFERENCES
    Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
    • 1,748
    • Highly Influential
    • PDF
    A fuzzy commitment scheme
    • 1,481
    • PDF
    Secure Remote Authentication Using Biometric Data
    • 234
    • PDF
    Public-key cryptography from different assumptions
    • 127
    • PDF
    Entropy loss in PUF-based key generation schemes: The repetition code pitfall
    • 46
    • PDF
    Is Public-Key Encryption Based on LPN Practical?
    • 26
    Fuzzy Identity-Based Encryption
    • 3,635
    • PDF
    Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
    • 483
    • PDF
    Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices
    • 95
    • PDF
    Lightweight and Secure PUF Key Storage Using Limits of Machine Learning
    • 93
    • PDF