A fuzzy commitment scheme
- 1 November 1999
- proceedings article
- Published by Association for Computing Machinery (ACM)
Abstract
We combine well-known techniques from the areas of error-correcting codes and cryptography to achieve a new type of cryptographic primitive that we refer to as a fuzzy commitment scheme. Like a conventional cryptographic commitment scheme, our fuzzy commitment scheme is both concealing and binding: it is infeasible for an attacker to learn the committed value, and also for the committer to decommit a value in more than one way. In a conventional scheme, a commitment must be opened using a unique witness, which acts, essentially, as a decryption key. By contrast, our scheme is fuzzy in the sense that it accepts a witness that is close to the original encrypting witness in a suitable metric, but not necessarily identical.This characteristic of our fuzzy commitment scheme makes it useful for applications such as biometric authentication systems, in which data is subject to random noise. Because the scheme is tolerant of error, it is capable of protecting biometric data just as conventional cryptographic techniques, like hash functions, are used to protect alphanumeric passwords. This addresses a major outstanding problem in the theory of biometric authentication. We prove the security characteristics of our fuzzy commitment scheme relative to the properties of an underlying cryptographic hash function.Keywords
This publication has 8 references indexed in Scilit:
- On enabling secure applications through off-line biometric identificationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Decoding algebraic-geometric codes beyond the error-correction boundPublished by Association for Computing Machinery (ACM) ,1998
- Cryptanalysis of block ciphers with probabilistic non-linear relations of low degreePublished by Springer Nature ,1998
- Decoding of Reed Solomon Codes beyond the Error-Correction BoundJournal of Complexity, 1997
- Collisionful keyed hash functions with selectable collisionsInformation Processing Letters, 1995
- High confidence visual recognition of persons by a test of statistical independencePublished by Institute of Electrical and Electronics Engineers (IEEE) ,1993
- Password securityCommunications of the ACM, 1979
- On the inherent intractability of certain coding problems (Corresp.)IEEE Transactions on Information Theory, 1978