DocumentCode :
2521604
Title :
A fully robust fuzzy extractor
Author :
Bo, Yang ; Aidong, Sun ; Wenzheng, Zhang
Author_Institution :
Coll. of Inf., South China Agric. Univ., Guangzhou, China
fYear :
2009
fDate :
10-11 Oct. 2009
Firstpage :
392
Lastpage :
395
Abstract :
Cryptography traditionally relies on uniformly distributed and precisely reproducible random strings for its secrets, however, it is difficult to create, store, and reliably retrieve such strings. To securely derive cryptographic keys from a noisy input such as biometric data, two primitives are introduced by Y. Dodis et.al.: a secure sketch which allows recovery of a noisy input given a ldquocloserdquo approximation thereof, and a fuzzy extractor which extracts a uniformly distributed string from this noisy input in an error-tolerant manner. Both primitives work by constructing a ldquopublicrdquo string which is used to encode the information needed for error-tolerant reconstruction of the original input and subsequent extraction. The public string, when transmitted over an insecure channel or stored in an insecure storage, can be modified by an adversary. A robust secure sketch and a robust fuzzy extractor mean that the public string can be authenticated by a receiver, if the authenticity of public string is verified by using, in some way, recovered string in secure sketch or extracted string in fuzzy extractor, we say that the authentication has circularity in it. In this paper, we propose a fully robust fuzzy extractor based on an error-correcting code, in which the public string can be authenticated by the receiver using his own a part of string that is close to sender´s string under some metric, thus the circularity in authentication can be broken fully. The security is proven in standard model.
Keywords :
error correction codes; public key cryptography; cryptography; error-correcting code; public string authenticity; robust fuzzy extractor; robust secure sketch; uniformly distributed string; Bioinformatics; Cryptography; Data mining; Data security; Educational institutions; Informatics; Information security; Message authentication; Robustness; Sun;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cyber-Enabled Distributed Computing and Knowledge Discovery, 2009. CyberC '09. International Conference on
Conference_Location :
Zhangijajie
Print_ISBN :
978-1-4244-5218-7
Electronic_ISBN :
978-1-4244-5219-4
Type :
conf
DOI :
10.1109/CYBERC.2009.5342191
Filename :
5342191
Link To Document :
بازگشت