An Improved Robust Fuzzy Extractor

被引:0
|
作者
Kanukurthi, Bhavana [1 ]
Reyzin, Leonid [1 ]
机构
[1] Boston Univ Comp Sci, Boston, MA 02215 USA
来源
SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS | 2008年 / 5229卷
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problem of building robust fuzzy extractors, which allow two parties holding similar random variables W, W' to agree on a secret key R in the presence of an active adversary. Robust fuzzy extractors were defined by Dodis et al. in Crypto 2006 to be noninteractive, i.e., only one message P, which can be modified by an unbounded adversary, can pass from one party to the other. This allows them to be used by a single party at different points in time (e.g., for key recovery or biometric authentication), but also presents an additional challenge: what if R is used, and thus possibly observed by the adversary, before the adversary has a chance to modify P. Fuzzy extractors secure against such a strong attack are called post-application robust. We construct a fuzzy extractor with post-application robustness that extracts a shared secret key of up to (2m-n)/2 bits (depending on error-tolerance and security parameters), where n is the bit-length and m is the entropy of W. The previously best known result, also of Dodis et al., extracted up to (2m - n)/3 bits (depending on the same parameters).
引用
收藏
页码:156 / 171
页数:16
相关论文
共 50 条
  • [41] Robust Automatic Detector And Feature Extractor For Dolphin Whistles
    Shkury, Guy
    Bud, Joel
    Zuriel, Yotam
    Scheinin, Aviad
    Diamant, Roee
    OCEANS 2019 - MARSEILLE, 2019,
  • [42] Fuzzy extractor based remote mutual biometric authentication
    Zhang, Fan
    Feng, Dengguo
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2009, 46 (05): : 850 - 856
  • [43] New Code Based Fuzzy Extractor for Biometric Cryptography
    Kuznetsov, Alexandr
    Kiyan, Anastasia
    Uvarova, Anna
    Serhiienko, Roman
    Smirnov, Valeriy
    2018 INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE: PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2018, : 119 - 124
  • [44] Pseudoentropic Isometries: A New Framework for Fuzzy Extractor Reusability
    Alamelou, Quentin
    Berthier, Paul-Edmond
    Cachet, Chloe
    Cauchie, Stephane
    Fuller, Benjamin
    Gaborit, Philippe
    Simhadri, Sailesh
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 673 - 684
  • [45] Efficient Fuzzy Extractor Implementations for PUF Based Authentication
    Wen, Yuejiang
    Lao, Yingjie
    PROCEEDINGS OF THE 2017 12TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), 2017, : 119 - 125
  • [46] Fingerprint authentication based on fuzzy extractor in the mobile device
    Li, Li
    Zhou, Siqin
    Tu, Hang
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2019, 11 (03) : 321 - 337
  • [47] A Ternary Fuzzy Extractor for Efficient Cryptographic Key Generation
    Kazumori, Kohei
    Ueno, Rei
    Homma, Naofumi
    2019 IEEE 49TH INTERNATIONAL SYMPOSIUM ON MULTIPLE-VALUED LOGIC (ISMVL), 2019, : 49 - 54
  • [48] Birds of a Feather Flock Together: Fuzzy Extractor and Gait-Based Robust Group Secret Key Generation for Smart Wearables
    Javali, Chitra
    Revadigar, Girish
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 338 - 357
  • [49] Improved visual background extractor with adaptive range change
    Shiyu Yang
    Kuangrong Hao
    Yongsheng Ding
    Jian Liu
    Memetic Computing, 2018, 10 : 53 - 61
  • [50] Improved AET Robust Control for Networked TS Fuzzy Systems With Asynchronous Constraints
    Li, Wenfeng
    Xie, Zhengchao
    Zhao, Jing
    Chu, Shaoqiang
    Wong, Pak Kin
    Gao, Jinwu
    IEEE TRANSACTIONS ON CYBERNETICS, 2022, 52 (03) : 1465 - 1478