A new cryptographic primitive for noise tolerant template security

被引:6
|
作者
Karabina, Koray [1 ,2 ]
Canpolat, Onur [1 ]
机构
[1] ZebraPET LLC, Privacy Enhancing Technol, Boca Raton, FL 33433 USA
[2] Florida Atlantic Univ, Boca Raton, FL 33431 USA
关键词
Template security; Biometrics; Physically Unclonable Functions; Noise tolerance; BIOMETRIC AUTHENTICATION;
D O I
10.1016/j.patrec.2016.05.016
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We introduce a new cryptographic primitive for noise tolerant template security. Our primitive consists of two algorithms. The first algorithm extracts a noise tolerant and secure template of fixed length binary data. The noise tolerance of our scheme follows from the second algorithm that determines whether two templates originate from a pair of data where the Hamming distance belongs to a priori-fixed error tolerance interval. The proposed scheme does not require any encryption infrastructure and its security does not rely on the secrecy of parameters. We discuss the security of our scheme with respect to the irreversibility and indistinguishability of templates and present concrete efficiency and security analysis for practical parameters under certain assumptions. Our techniques can potentially be used to increase security of systems and privacy of users in certain applications including biometric authentication systems and embedded security systems based on Physically Unclonable Functions. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:70 / 75
页数:6
相关论文
共 50 条
  • [21] LOKI - A CRYPTOGRAPHIC PRIMITIVE FOR AUTHENTICATION AND SECRECY APPLICATIONS
    BROWN, L
    PIEPRZYK, J
    SEBERRY, J
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 453 : 229 - 236
  • [22] Non-cryptographic primitive for pseudorandom permutation
    Iwata, T
    Yoshino, T
    Kurosawa, K
    FAST SOFTWARE ENCRYPTION (REVISED PAPERS), 2002, 2365 : 149 - 163
  • [23] On the Synthesis of Attack Tolerant Cryptographic Hardware
    Mathew, J.
    Banerjee, S.
    Rahaman, H.
    Pradhan, D. K.
    Mohanty, S. P.
    Jabir, A. M.
    PROCEEDINGS OF THE 2010 18TH IEEE/IFIP INTERNATIONAL CONFERENCE ON VLSI AND SYSTEM-ON-CHIP, 2010, : 286 - 291
  • [24] On the use of GF-inversion as a cryptographic primitive
    Aoki, K
    Vaudenay, S
    SELECTED AREAS IN CRYPTOGRAPHY, 2004, 3006 : 234 - 247
  • [25] Verification of a Cryptographic Primitive: SHA-256
    Appel, Andrew W.
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2015, 37 (02):
  • [26] On the Security Loss in Cryptographic Reductions
    Lu, Chi-Jen
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009, 2009, 5479 : 72 - 87
  • [27] Hiding Cliques for Cryptographic Security
    Ari Juels
    Marcus Peinado
    Designs, Codes and Cryptography, 2000, 20 : 269 - 280
  • [28] Security and cryptographic hardware implementations
    Sklavos, N
    Proceedings of the 46th IEEE International Midwest Symposium on Circuits & Systems, Vols 1-3, 2003, : 768 - 769
  • [29] CRYPTOGRAPHIC TECHNIQUES AND NETWORK SECURITY
    AYOUB, F
    SINGH, K
    IEE PROCEEDINGS-F RADAR AND SIGNAL PROCESSING, 1984, 131 (07) : 684 - 694
  • [30] Hiding cliques for cryptographic security
    Juels, A
    Peinado, M
    DESIGNS CODES AND CRYPTOGRAPHY, 2000, 20 (03) : 269 - 280