DocumentCode :
81105
Title :
The Spammed Code Offset Method
Author :
Skoric, Boris ; de Vreede, Niels
Author_Institution :
Eindhoven Univ. of Technol., Eindhoven, Netherlands
Volume :
9
Issue :
5
fYear :
2014
fDate :
May-14
Firstpage :
875
Lastpage :
884
Abstract :
Helper data schemes are a security primitive used for privacy-preserving biometric databases and physical unclonable functions. One of the oldest known helper data schemes is the code offset method (COM). We propose an extension of the COM: the helper data are accompanied by many instances of fake helper data that are drawn from the same distribution as the real one. While the adversary has no way to distinguish between them, the legitimate party has more information and can see the difference. We use a low-density parity check code in order to improve the efficiency of the legitimate party´s selection procedure. Our construction provides a new kind of tradeoff: more effective use of the source entropy, at the price of increased helper data storage. We give a security analysis in terms of Shannon entropy and order-2 Rényi entropy. We also propose a variant of our scheme in which the helper data list is not stored but pseudorandomly generated, changing the tradeoff to source entropy utilization versus computation effort.
Keywords :
data privacy; entropy codes; parity check codes; random processes; COM; Shannon entropy; helper data storage scheme; legitimate party selection procedure; low-density parity check code; order-2 Rényi entropy; physical unclonable function; privacy-preserving biometric database; pseudorandom generation; security primitive analysis; spammed code offset method; Decoding; Entropy; Iron; Noise measurement; Parity check codes; Security; Vectors; Code offset method; fuzzy extractor; helper data; secure sketch;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2014.2312851
Filename :
6798816
Link To Document :
بازگشت