A new cryptographic primitive for noise tolerant template security

被引:6
|
作者
Karabina, Koray [1 ,2 ]
Canpolat, Onur [1 ]
机构
[1] ZebraPET LLC, Privacy Enhancing Technol, Boca Raton, FL 33433 USA
[2] Florida Atlantic Univ, Boca Raton, FL 33431 USA
关键词
Template security; Biometrics; Physically Unclonable Functions; Noise tolerance; BIOMETRIC AUTHENTICATION;
D O I
10.1016/j.patrec.2016.05.016
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We introduce a new cryptographic primitive for noise tolerant template security. Our primitive consists of two algorithms. The first algorithm extracts a noise tolerant and secure template of fixed length binary data. The noise tolerance of our scheme follows from the second algorithm that determines whether two templates originate from a pair of data where the Hamming distance belongs to a priori-fixed error tolerance interval. The proposed scheme does not require any encryption infrastructure and its security does not rely on the secrecy of parameters. We discuss the security of our scheme with respect to the irreversibility and indistinguishability of templates and present concrete efficiency and security analysis for practical parameters under certain assumptions. Our techniques can potentially be used to increase security of systems and privacy of users in certain applications including biometric authentication systems and embedded security systems based on Physically Unclonable Functions. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:70 / 75
页数:6
相关论文
共 50 条
  • [31] Contactless Security Token Enhanced Security by Using New Hardware Features in Cryptographic-Based Security Mechanisms
    Ullmann, Markus
    Voegeler, Matthias
    TOWARDS HARDWARE-INTRINSIC SECURITY: FOUNDATIONS AND PRACTICE, 2010, : 259 - 279
  • [32] The design of a cryptographic security architecture
    Gutmann, P
    USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), 1999, : 153 - 168
  • [33] Cryptographic security for mobile code
    Algesheimer, J
    Cachin, C
    Camenisch, J
    Karjoth, G
    2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, : 2 - 11
  • [34] The gap-problems: A new class of problems for the security of cryptographic schemes
    Okamoto, T
    Pointcheval, D
    PUBLIC KEY CRYPTOGRAPHY, PROCEEDINGS, 2001, 1992 : 104 - 118
  • [35] Cryptographic Security of Individual Instances
    Antunes, L.
    Laplante, S.
    Pinto, A.
    Salvador, L.
    INFORMATION THEORETIC SECURITY, 2009, 4883 : 195 - +
  • [36] On the Bit Security of Cryptographic Primitives
    Micciancio, Daniele
    Walter, Michael
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT I, 2018, 10820 : 3 - 28
  • [37] Threshold computation and cryptographic security
    Han, YN
    Hemaspaandra, LA
    Thierauf, T
    SIAM JOURNAL ON COMPUTING, 1997, 26 (01) : 59 - 78
  • [38] A NEW DESIGN OF CRYPTOGRAPHIC KEY MANAGEMENT FOR HIPAA PRIVACY AND SECURITY REGULATIONS
    Huang, Hui-Feng
    Liu, Kuo-Ching
    Wang, Hsin-Wei
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (11A): : 3923 - 3931
  • [39] New Models and Methods for Estimating the Cryptographic Strength of Information Security Systems
    Zadiraka V.K.
    Kudin A.M.
    Zadiraka, V.K. (zvk140@ukr.net), 1600, Springer Science and Business Media, LLC (53): : 978 - 985
  • [40] Predicting New Attacks: A Case Study in Security Analysis of Cryptographic Protocols
    Bao, Da
    Wagatsuma, Kazunori
    Gao, Hongbiao
    Cheng, Jingde
    ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURETECH & MUE, 2016, 393 : 263 - 270