EEMCS

Home > Publications
Home University of Twente
Education
Research
Prospective Students
Jobs
Publications
Intranet (internal)
 
 Nederlands
 Contact
 Search
 Organisation

EEMCS EPrints Service


17965 Embedding Renewable Cryptographic Keys into Noisy Data
Home Policy Brochure Browse Search User Area Contact Help

Buhan, I.R. and Doumen, J.M. and Hartel, P.H. and Tang, Qiang and Veldhuis, R.N.J. (2010) Embedding Renewable Cryptographic Keys into Noisy Data. International Journal of Information Security, 9 (3). pp. 193-208. ISSN 1615-5262 *** ISI Impact 1,279 ***

This is the latest version of this eprint.

Full text available as:

PDF
- Univ. of Twente only
1214 Kb

Official URL: http://dx.doi.org/10.1007/s10207-010-0103-4

Exported to Metis

Abstract

A fuzzy extractor is a powerful but theoretical tool that can be used to extract uniform strings from (discrete) noisy sources. However, when using a fuzzy extractor in practice, extra features are needed, such as the renewability of the extracted strings and the ability to use the fuzzy extractor directly on continuous input data instead of discrete data. Our contribution is threefold. Firstly, we propose a fuzzy embedder as a generalization of the fuzzy extractor. A fuzzy embedder naturally supports renewability, as it allows a string to be embedded instead of extracted. It also supports direct analysis of quantization effects, as it makes no limiting assumptions about the nature of the input source. Secondly, we give a general construction for fuzzy embedders based on the technique of quantization index modulation (QIM). We show that the performance measures of a QIM, as proposed by the watermarking community, translate directly to the security properties of the corresponding fuzzy embedder. Finally, we show that from the perspective of the length of the embedded string, quantization in two dimensions is optimal. We present two practical constructions for a fuzzy embedder in two-dimensional space. The first construction is optimal from reliability perspective, and the second construction is optimal in the length of the embedded string.

Item Type:Article
Research Group:EWI-DIES: Distributed and Embedded Security, EWI-SAS: Signals and Systems
Research Program:CTIT-ISTRICE: Integrated Security and Privacy in a Networked World, UT-CST: Crime Science Twente
Research Project:Secure Grip
Uncontrolled Keywords:Biometrics, Cryptographic keys, Sphere packing
ID Code:17965
Status:Published
Deposited On:31 May 2010
Refereed:Yes
International:Yes
ISI Impact Factor:1,279
More Information:statisticsmetis

Available Versions of this Item

Export this item as:

To request a copy of the PDF please email us request copy

To correct this item please ask your editor

Repository Staff Only: edit this item