Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Top Cited Papers
- 1 January 2008
- journal article
- Published by Society for Industrial & Applied Mathematics (SIAM) in SIAM Journal on Computing
- Vol. 38 (1) , 97-139
- https://doi.org/10.1137/060651380
Abstract
We provide formal definitions and efficient secure techniques for - turning noisy information into keys usable for any cryptographic application, and, in particular, - reliably and securely authenticating biometric data. Our techniques apply not just to biometric information, but to any keying material that, unlike traditional cryptographic keys, is (1) not reproducible precisely and (2) not distributed uniformly. We propose two primitives: a "fuzzy extractor" reliably extracts nearly uniform randomness R from its input; the extraction is error-tolerant in the sense that R will be the same even if the input changes, as long as it remains reasonably close to the original. Thus, R can be used as a key in a cryptographic application. A "secure sketch" produces public information about its input w that does not reveal w, and yet allows exact recovery of w given another value that is close to w. Thus, it can be used to reliably reproduce error-prone biometric inputs without incurring the security risk inherent in storing them. We define the primitives to be both formally secure and versatile, generalizing much prior work. In addition, we provide nearly optimal constructions of both primitives for various measures of ``closeness'' of input data, such as Hamming distance, edit distance, and set difference.Comment: 47 pp., 3 figures. Prelim. version in Eurocrypt 2004, Springer LNCS 3027, pp. 523-540. Differences from version 3: minor edits for grammar, clarity, and typoKeywords
All Related Versions
This publication has 18 references indexed in Scilit:
- A Fuzzy Vault SchemeDesigns, Codes and Cryptography, 2006
- Protecting secret keys with personal entropyFuture Generation Computer Systems, 2000
- Upper bounds for constant-weight codesIEEE Transactions on Information Theory, 2000
- A Pseudorandom Generator from any One-way FunctionSIAM Journal on Computing, 1999
- Generalized privacy amplificationIEEE Transactions on Information Theory, 1995
- Secret key agreement by public discussion from common informationIEEE Transactions on Information Theory, 1993
- A new table of constant weight codesIEEE Transactions on Information Theory, 1990
- Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication ComplexitySIAM Journal on Computing, 1988
- Privacy Amplification by Public DiscussionSIAM Journal on Computing, 1988
- Universal classes of hash functionsJournal of Computer and System Sciences, 1979