A new cryptographic primitive for noise tolerant template security

被引:6
|
作者
Karabina, Koray [1 ,2 ]
Canpolat, Onur [1 ]
机构
[1] ZebraPET LLC, Privacy Enhancing Technol, Boca Raton, FL 33433 USA
[2] Florida Atlantic Univ, Boca Raton, FL 33431 USA
关键词
Template security; Biometrics; Physically Unclonable Functions; Noise tolerance; BIOMETRIC AUTHENTICATION;
D O I
10.1016/j.patrec.2016.05.016
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We introduce a new cryptographic primitive for noise tolerant template security. Our primitive consists of two algorithms. The first algorithm extracts a noise tolerant and secure template of fixed length binary data. The noise tolerance of our scheme follows from the second algorithm that determines whether two templates originate from a pair of data where the Hamming distance belongs to a priori-fixed error tolerance interval. The proposed scheme does not require any encryption infrastructure and its security does not rely on the secrecy of parameters. We discuss the security of our scheme with respect to the irreversibility and indistinguishability of templates and present concrete efficiency and security analysis for practical parameters under certain assumptions. Our techniques can potentially be used to increase security of systems and privacy of users in certain applications including biometric authentication systems and embedded security systems based on Physically Unclonable Functions. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:70 / 75
页数:6
相关论文
共 50 条
  • [1] On the Security Analysis of Weak Cryptographic Primitive Based Key Derivation Function
    Chuah, Chai Wen
    Deris, Mustafa Mat
    Dawson, Edward
    [J]. INFORMATION SCIENCE AND APPLICATIONS 2017, ICISA 2017, 2017, 424 : 231 - 240
  • [2] Docurity: A New Cryptographic Primitive for Collaborative Cloud Systems
    Kim, Byeori
    Choi, Minseong
    Youn, Taek-Young
    Yi, Jeong Hyun
    Cho, Haehyun
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 36 (03): : 3725 - 3742
  • [3] An adaptive intrusion-tolerant approach to protecting operation security of cryptographic protocols
    Hao, Yaohui
    Guo, Yuanbo
    Lu, Yu
    [J]. Gaojishu Tongxin/Chinese High Technology Letters, 2009, 19 (07): : 706 - 712
  • [4] On tolerant cryptographic constructions
    Herzberg, A
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2005, PROCEEDINGS, 2005, 3376 : 172 - 190
  • [5] A NEW METHOD FOR ANALYZING THE SECURITY OF CRYPTOGRAPHIC PROTOCOLS
    TOUSSAINT, MJ
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1993, 11 (05) : 702 - 714
  • [6] Controlled operations as a cryptographic primitive
    Izotov, BV
    Moldovyan, AA
    Moldovyan, NA
    [J]. INFORMATION ASSURANCE IN COMPUTER NETWORKS: METHODS, MODELS AND ARCHITECTURES FOR NETWORK SECURITY, PROCEEDINGS, 2001, 2052 : 230 - 241
  • [7] Universally composable security: A new paradigm for cryptographic protocols
    Canetti, R
    [J]. 42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, : 136 - 145
  • [8] A security oriented transient-noise simulation methodology: Evaluation of intrinsic physical noise of cryptographic designs
    Nawaz, Kashif
    Van Brandt, Leopold
    Levi, Itamar
    Standaert, Francois-Xavier
    Flandre, Denis
    [J]. INTEGRATION-THE VLSI JOURNAL, 2019, 68 : 71 - 79
  • [9] Cryptographic Applications of Primitive Pythagorean Triples
    Kak, Subhash
    Prabhu, Monisha
    [J]. CRYPTOLOGIA, 2014, 38 (03) : 215 - 222
  • [10] A language-dependent cryptographic primitive
    Itoh, T
    Ohta, Y
    Shizuya, H
    [J]. JOURNAL OF CRYPTOLOGY, 1997, 10 (01) : 37 - 49