一种全鲁棒模糊提取器

Yang Bo, Sun Aidong, Zhang Wenzheng
{"title":"一种全鲁棒模糊提取器","authors":"Yang Bo, Sun Aidong, Zhang Wenzheng","doi":"10.1109/CYBERC.2009.5342191","DOIUrl":null,"url":null,"abstract":"Cryptography traditionally relies on uniformly distributed and precisely reproducible random strings for its secrets, however, it is difficult to create, store, and reliably retrieve such strings. To securely derive cryptographic keys from a noisy input such as biometric data, two primitives are introduced by Y. Dodis et.al.: a secure sketch which allows recovery of a noisy input given a “close” approximation thereof, and a fuzzy extractor which extracts a uniformly distributed string from this noisy input in an error-tolerant manner. Both primitives work by constructing a “public” string which is used to encode the information needed for error-tolerant reconstruction of the original input and subsequent extraction. The public string, when transmitted over an insecure channel or stored in an insecure storage, can be modified by an adversary. A robust secure sketch and a robust fuzzy extractor mean that the public string can be authenticated by a receiver, if the authenticity of public string is verified by using, in some way, recovered string in secure sketch or extracted string in fuzzy extractor, we say that the authentication has circularity in it. In this paper, we propose a fully robust fuzzy extractor based on an error-correcting code, in which the public string can be authenticated by the receiver using his own a part of string that is close to sender's string under some metric, thus the circularity in authentication can be broken fully. The security is proven in standard model.","PeriodicalId":222874,"journal":{"name":"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"62 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"A fully robust fuzzy extractor\",\"authors\":\"Yang Bo, Sun Aidong, Zhang Wenzheng\",\"doi\":\"10.1109/CYBERC.2009.5342191\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cryptography traditionally relies on uniformly distributed and precisely reproducible random strings for its secrets, however, it is difficult to create, store, and reliably retrieve such strings. To securely derive cryptographic keys from a noisy input such as biometric data, two primitives are introduced by Y. Dodis et.al.: a secure sketch which allows recovery of a noisy input given a “close” approximation thereof, and a fuzzy extractor which extracts a uniformly distributed string from this noisy input in an error-tolerant manner. Both primitives work by constructing a “public” string which is used to encode the information needed for error-tolerant reconstruction of the original input and subsequent extraction. The public string, when transmitted over an insecure channel or stored in an insecure storage, can be modified by an adversary. A robust secure sketch and a robust fuzzy extractor mean that the public string can be authenticated by a receiver, if the authenticity of public string is verified by using, in some way, recovered string in secure sketch or extracted string in fuzzy extractor, we say that the authentication has circularity in it. In this paper, we propose a fully robust fuzzy extractor based on an error-correcting code, in which the public string can be authenticated by the receiver using his own a part of string that is close to sender's string under some metric, thus the circularity in authentication can be broken fully. The security is proven in standard model.\",\"PeriodicalId\":222874,\"journal\":{\"name\":\"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery\",\"volume\":\"62 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CYBERC.2009.5342191\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CYBERC.2009.5342191","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

摘要

传统的密码学依赖于均匀分布和精确可复制的随机字符串作为其秘密,然而,很难创建、存储和可靠地检索这样的字符串。为了从诸如生物特征数据之类的噪声输入中安全地导出加密密钥,Y. Dodis等人引入了两个基本要素:一个允许在给定“接近”近似值的情况下恢复噪声输入的安全草图,以及一个模糊提取器,它以容错的方式从噪声输入中提取均匀分布的字符串。这两个原语都通过构造一个“公共”字符串来工作,该字符串用于对原始输入的容错重建和随后的提取所需的信息进行编码。当通过不安全的通道传输或存储在不安全的存储中时,攻击者可以修改公共字符串。一个鲁棒的安全草图和一个鲁棒的模糊提取器意味着公共字符串可以被接收方认证,如果通过某种方式使用安全草图中恢复的字符串或模糊提取器中提取的字符串来验证公共字符串的真实性,我们说该认证具有循环性。本文提出了一种基于纠错码的全鲁棒模糊提取器,接收方可以利用自己的字符串在一定度量下与发送方字符串接近的部分对公开字符串进行认证,从而可以完全打破认证的循环性。在标准模型中验证了该方法的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A fully robust fuzzy extractor
Cryptography traditionally relies on uniformly distributed and precisely reproducible random strings for its secrets, however, it is difficult to create, store, and reliably retrieve such strings. To securely derive cryptographic keys from a noisy input such as biometric data, two primitives are introduced by Y. Dodis et.al.: a secure sketch which allows recovery of a noisy input given a “close” approximation thereof, and a fuzzy extractor which extracts a uniformly distributed string from this noisy input in an error-tolerant manner. Both primitives work by constructing a “public” string which is used to encode the information needed for error-tolerant reconstruction of the original input and subsequent extraction. The public string, when transmitted over an insecure channel or stored in an insecure storage, can be modified by an adversary. A robust secure sketch and a robust fuzzy extractor mean that the public string can be authenticated by a receiver, if the authenticity of public string is verified by using, in some way, recovered string in secure sketch or extracted string in fuzzy extractor, we say that the authentication has circularity in it. In this paper, we propose a fully robust fuzzy extractor based on an error-correcting code, in which the public string can be authenticated by the receiver using his own a part of string that is close to sender's string under some metric, thus the circularity in authentication can be broken fully. The security is proven in standard model.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信