Filters








260 Hits in 3.3 sec

A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.'s Construction [chapter]

Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim, Jongchan Lee
2018 Lecture Notes in Computer Science  
In this paper, modifying this reusable FE, we propose a new FE with size-reduced helper data hiring a threshold scheme.  ...  After the concept of a Fuzzy Extractor (FE) was first introduced by Dodis et al. , it has been regarded as one of the candidate solutions for key management utilizing biometric data.  ...  's reusable fuzzy extractor as a C++ program.  ... 
doi:10.1007/978-3-319-93638-3_3 fatcat:4up27ifhafbwpcpjn4tlwp7b5m

An Improved Fuzzy Vector Signature with Reusability

Ilhwan Lim, Minhye Seo, Dong Hoon Lee, Jong Hwan Park
2020 Applied Sciences  
In this paper, we propose an improved FVS scheme which is proven to be reusable with respect to arbitrary correlated fuzzy (biometric) inputs.  ...  of a single user, which are all generated with correlated fuzzy (biometric) data, are exposed to the adversary.  ...  In order for a reusable fuzzy extractor to be widely used in practice, it should be able to tolerate more than a certain level of errors inherent in fuzzy (biometric) data.  ... 
doi:10.3390/app10207141 fatcat:bxe3k53mdvhlfekaphswaff4ni

Error Correction in the Bounded Storage Model [chapter]

Yan Zong Ding
2005 Lecture Notes in Computer Science  
In particular, we show that any local fuzzy extractor yields a secure and error-resilient cryptosystem in the model, in analogy to the result of Lu (JoC, 2004) that any local strong extractor yields a  ...  In this paper, we provide a general paradigm for constructing secure and error-resilient private-key cryptosystems in the bounded storage model that tolerate a constant fraction of errors, and attain the  ...  Acknowledgment I thank Michael Rabin and Salil Vadhan for numerous insightful discussions on the bounded storage model, in particular the one that brought up the issue of error correction.  ... 
doi:10.1007/978-3-540-30576-7_31 fatcat:uziixtzpmfhfbihz3nnomzwzd4

Building Secure SRAM PUF Key Generators on Resource Constrained Devices [article]

Yansong Gao, Yang Su, Wei Yang, Shiping Chen, Surya Nepal, Damith C. Ranasinghe
2019 arXiv   pre-print
A fuzzy extractor can turn noisy PUF responses into usable cryptographic keys.  ...  However, a fuzzy extractor is not immediately mountable on (highly) resource constrained devices due to its implementation overhead.  ...  ., -2O-VN, that offer reusability should be chosen for the reverse fuzzy extractor. VI.  ... 
arXiv:1902.03031v1 fatcat:5oxvoi4qindbxj2bsm5s74s6fi

Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience [chapter]

Yangguang Tian, Yingjiu Li, Rongmao Chen, Nan Li, Ximeng Liu, Bing Chang, Xingjie Yu
2018 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Biometric-based remote user authentication is a useful primitive that allows an authorized user to authenticate to a remote server using his biometrics.  ...  To address these issues, we propose a novel leakage-resilient and privacy-preserving biometric-based remote user authentication framework, such that registered users securely and privately authenticate  ...  [8] , most constructions of fuzzy extractor are not reusable (except [5, 8] ), and adding error-correcting codes to a strong extractor with hard-to-invert auxiliary inputs at the fuzzy case (i.e., when  ... 
doi:10.1007/978-3-030-01701-9_7 fatcat:c4pqjrv4hrdd5gwuzdzi7mvl7i

Reusable cryptographic fuzzy extractors

Xavier Boyen
2004 Proceedings of the 11th ACM conference on Computer and communications security - CCS '04  
We show that a number of recent definitions and constructions of fuzzy extractors are not adequate for multiple uses of the same fuzzy secret-a major shortcoming in the case of biometric applications.  ...  As an illustration, we demonstrate how to use a biometric secret in a remote error tolerant authentication protocol that does not require any storage on the client's side.  ...  "Zero Storage" Remote Biometric Authentication To demonstrate the power of the reusable fuzzy extractor machinery, we briefly present a remote biometric authentication protocol with third party certification  ... 
doi:10.1145/1030083.1030096 dblp:conf/ccs/Boyen04 fatcat:24mmg6dvenbcbmt4kskomwgzpm

Construction of a New Biometric-Based Key Derivation Function and Its Application

Minhye Seo, Jong Hwan Park, Youngsam Kim, Sangrae Cho, Dong Hoon Lee, Jung Yeon Hwang
2018 Security and Communication Networks  
The fuzzy extractor is known as a prominent biometric cryptosystem.  ...  However, the fuzzy extractor has a drawback in that a user is required to store user-specific helper data or receive it online from the server with additional trusted channel, to derive a correct key.  ...  Over a decade later, in 2016, a reusable fuzzy extractor was proposed with no limitation on the number of correlated readings of the source [15] .  ... 
doi:10.1155/2018/6107912 fatcat:p7shvzft4jb7rjfgyeoffffkoi

Robust Fuzzy Extractors and Authenticated Key Agreement From Close Secrets

Yevgeniy Dodis, Bhavana Kanukurthi, Jonathan Katz, Leonid Reyzin, Adam Smith
2012 IEEE Transactions on Information Theory  
W = W and the goal is to transform a nonuniform shared secret to a uniform one), or "fuzzy extraction."  ...  The former has applications to, e.g., biometric authentication, while the latter arises in, e.g., the bounded-storage model with errors.  ...  bounded-storage model (BSM) with errors.  ... 
doi:10.1109/tit.2012.2200290 fatcat:c7ayvs2h5fbmbmd2h6ag2arhbe

Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets [chapter]

Yevgeniy Dodis, Jonathan Katz, Leonid Reyzin, Adam Smith
2006 Lecture Notes in Computer Science  
W = W and the goal is to transform a nonuniform shared secret to a uniform one), or "fuzzy extraction."  ...  The former has applications to, e.g., biometric authentication, while the latter arises in, e.g., the bounded-storage model with errors.  ...  bounded-storage model (BSM) with errors.  ... 
doi:10.1007/11818175_14 fatcat:ub5t3izmcvemrljhw37uwgmudy

Lightweight (Reverse) Fuzzy Extractor With Multiple Reference PUF Responses

Yansong Gao, Yang Su, Lei Xu, Damith C. Ranasinghe
2019 IEEE Transactions on Information Forensics and Security  
One primary PUF application is the secure derivation of volatile cryptographic keys using a fuzzy extractor comprising of two procedures: i) secure sketch; and ii) entropy extraction.  ...  A Physical unclonable functions (PUF), alike a fingerprint, exploits manufacturing randomness to endow each physical item with a unique identifier.  ...  Nevertheless, a reverse fuzzy extractor with MRR is naturally compatible with debiasing schemes that offer reusability.  ... 
doi:10.1109/tifs.2018.2886624 fatcat:k4fiob4ipvhrlggua4eetzigx4

Fuzzy Extractors for Biometric Identification

Nan Li, Fuchun Guo, Yi Mu, Willy Susilo, Surya Nepal
2017 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)  
The proposed protocol is able to identify a user with constant computational cost rather than linear-time computation required by other fuzzy extractor schemes.  ...  The proposed protocol is able to identify a user with constant computational cost rather than linear-time computation required by other fuzzy extractor schemes.  ...  Generally speaking, a fuzzy extractor can be derived by using a secure sketch with a strong randomness extractor.  ... 
doi:10.1109/icdcs.2017.107 dblp:conf/icdcs/LiGMSN17 fatcat:fuwhncndqvdgzg6ueptdax7yl4

Efficient Fuzzy Extraction Of Puf-Induced Secrets: Theory And Applications

Jeroen Delvaux, Dawu Gu, Ingrid Verbauwhede, Matthias Hiller, Meng-Day Yu
2016 Zenodo  
Fuzzy extractors transform this noisy non-uniformly distributed secret into a stable high-entropy key.  ...  As such, we debunk the reusability claim of the reverse fuzzy extractor. Moreover, we provide proper quantitative motivation for debiasing schemes, as this was missing in the original proposals.  ...  A Fundamental Security Flaw in Reverse Fuzzy Extractors The reverse fuzzy extractor, as proposed by Van Herrewege et al.  ... 
doi:10.5281/zenodo.55449 fatcat:472252ayczdsnnzo3zjk2edg7i

Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications [chapter]

Jeroen Delvaux, Dawu Gu, Ingrid Verbauwhede, Matthias Hiller, Meng-Day Yu
2016 Lecture Notes in Computer Science  
Fuzzy extractors transform this noisy non-uniformly distributed secret into a stable high-entropy key.  ...  As such, we debunk the reusability claim of the reverse fuzzy extractor. Moreover, we provide proper quantitative motivation for debiasing schemes, as this was missing in the original proposals.  ...  The implementation footprint of a practical fuzzy extractor, using the (n − k) bound and the BoundWorstCase algorithm respectively.  ... 
doi:10.1007/978-3-662-53140-2_20 fatcat:famnb652sreyld2sbg77x5sicy

SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices [article]

Yang Su, Yansong Gao, Michael Chesser, Omid Kavehei, Alanson Sample, Damith C.Ranasinghe
2019 arXiv   pre-print
The design of SecuCode: i) overcomes the resource-constrained and intermittently powered nature of the CRFID devices; ii) is fully compatible with existing communication protocols employed by CRFID devices  ...  Function (SRAM PUF) to a firmware update protocol.  ...  Specifically, S ←MAC(m, sk) computes a MAC from a message m-to prevent replay attacks, a nonce can be concatenated with the message-and a key sk. • Fuzzy Extractor A fuzzy extractor FE is defined by two  ... 
arXiv:1807.10463v3 fatcat:moig5tynmbecvo63ihhpkedjca

MLP based Reusability Assessment Automation Model for Java based Software Systems

Surbhi Maggo, Chetna Gupta
2014 International Journal of Modern Education and Computer Science  
The presented model follows a reusability metric framework that targets the requisite reusability attributes including maintainability (using the Maintainability Index) for functional analysis of the components  ...  The results generated using JRA 2 M 2 indicate that the proposed automation tool can be effectively used as a reliable and efficient solution for automated evaluation of reusability.  ...  [19] also propose an approach that uses a hybrid of Neuro fuzzy and genetic algorithm for identifying reusable software components at the functional level with the help of the CB metric suite.  ... 
doi:10.5815/ijmecs.2014.08.06 fatcat:y5bexrv2inhwnk2dh6nvakxlo4
« Previous Showing results 1 — 15 out of 260 results