Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

被引:937
作者
Dodis, Yevgeniy [1 ]
Ostrovsky, Rafail [2 ]
Reyzin, Leonid [3 ]
Smith, Adam [4 ]
机构
[1] NYU, Dept Comp Sci, New York, NY 10012 USA
[2] Univ Calif Los Angeles, Dept Comp Sci, Los Angeles, CA 90095 USA
[3] Boston Univ, Dept Comp Sci, Boston, MA 02215 USA
[4] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16803 USA
关键词
fuzzy extractors; fuzzy fingerprints; randomness extractors; error-correcting codes; biometric authentication; error-tolerance; nonuniformity; password-based systems; metric embeddings;
D O I
10.1137/060651380
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We provide formal definitions and efficient secure techniques for turning noisy information into keys usable for any cryptographic application, and, in particular, reliably and securely authenticating biometric data. Our techniques apply not just to biometric information, but to any keying material that, unlike traditional cryptographic keys, is (1) not reproducible precisely and (2) not distributed uniformly. We propose two primitives: a fuzzy extractor reliably extracts nearly uniform randomness R from its input; the extraction is error-tolerant in the sense that R will be the same even if the input changes, as long as it remains reasonably close to the original. Thus, R can be used as a key in a cryptographic application. A secure sketch produces public information about its input w that does not reveal w and yet allows exact recovery of w given another value that is close to w. Thus, it can be used to reliably reproduce error-prone biometric inputs without incurring the security risk inherent in storing them. We de. ne the primitives to be both formally secure and versatile, generalizing much prior work. In addition, we provide nearly optimal constructions of both primitives for various measures of "closeness" of input data, such as Hamming distance, edit distance, and set difference.
引用
收藏
页码:97 / 139
页数:43
相关论文
共 75 条
[1]   Upper bounds for constant-weight codes [J].
Agrell, E ;
Vardy, A ;
Zeger, K .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (07) :2373-2395
[2]  
Andoni A, 2007, ANN IEEE SYMP FOUND, P724, DOI 10.1109/FOCS.2007.60
[3]  
[Anonymous], BUCSTR2007011
[4]  
BARRAL C, 2004, ENTERNALIZED FINGERP
[5]  
BENNETT CH, 1992, LECT NOTES COMPUT SC, V576, P351
[6]   Generalized privacy amplification [J].
Bennett, CH ;
Brassard, G ;
Crepeau, C ;
Maurer, UM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) :1915-1923
[7]   PRIVACY AMPLIFICATION BY PUBLIC DISCUSSION [J].
BENNETT, CH ;
BRASSARD, G ;
ROBERT, JM .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :210-229
[8]  
Blahut R. E., 1983, THEORY PRACTICE ERRO
[9]  
Boyen X, 2005, LECT NOTES COMPUT SC, V3494, P147
[10]  
Boyen X., 2004, Proceedings of the 11th ACM Conference on Computer and Communications Security, P82, DOI DOI 10.1145/1030083.1030096