Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1229285.1229325acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
Article

Fuzzy extractors for continuous distributions

Published: 20 March 2007 Publication History

Abstract

We show that there is a direct relation between the maximum length of the keys extracted from biometric data and the error rates of the biometric system. The length of the bio-key depends on the amount of information that can be extracted from the source data. This information can be used a-priori to evaluate the potential of the biometric data in the context of a specific cryptographic application. We model the biometric data more naturally as a continuous distribution and we give a new definition for fuzzy extractors that works better for this type of data.

References

[1]
Ruud Bolle, Jonathan Connell, Sharanthchandra Pankanti, Nalini Ratha, and Andrew Senior. Guide to Biometrics. SpringerVerlag, 2003.
[2]
Xavier Boyen. Reusable cryptographic fuzzy extractors. In Vijayalakshmi Atluri, Birgit Pfitzmann, and Patrick Drew McDaniel, editors, ACM Conference on Computer and Communications Security, pages 82--91. ACM, 2004.
[3]
I. R. Buhan, J. M. Doumen, P. H. Hartel, and R. N. J. Veldhuis. Fuzzy extractors for continuous distributions. Technical Report TR-CTIT-06-72, Enschede, October 2006.
[4]
Yao-Jen Chang, Wende Zhang, and Tsuhan Chen. Biometrics-based cryptographic key generation. In ICME, pages 2203--2206. IEEE, 2004.
[5]
Yevgeniy Dodis, Leonid Reyzin, and Adam Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Christian Cachin and Jan Camenisch, editors, EUROCRYPT, volume 3027 of Lecture Notes in Computer Science, pages 523--540. Springer, 2004.
[6]
Jean-Paul M. G. Linnartz and Pim Tuyls. New shielding functions to enhance privacy and prevent misuse of biometric templates. In Josef Kittler and Mark S. Nixon, editors, AVBPA, volume 2688 of Lecture Notes in Computer Science, pages 393--402. Springer, 2003.
[7]
Fabian Monrose, Michael K. Reiter, Qi Li, and Susanne Wetzel. Cryptographic key generation from voice. In IEEE Symposium on Security and Privacy, pages 202--213, 2001.
[8]
L. O'Gorman. Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE, 91(12):2021--2040, 2003.
[9]
Pim Tuyls, Anton H. M. Akkermans, Tom A. M. Kevenaar, Geert Jan Schrijen, Asker M. Bazen, and Raymond N. J. Veldhuis. Practical biometric authentication with template protection. In Takeo Kanade, Anil K. Jain, and Nalini K. Ratha, editors, AVBPA, volume 3546 of Lecture Notes in Computer Science, pages 436--446. Springer, 2005.
[10]
Umut Uludag, Sharath Pankanti, and Anil K. Jain. Fuzzy vault for fingerprints. In Takeo Kanade, Anil K. Jain, and Nalini K. Ratha, editors, AVBPA, volume 3546 of Lecture Notes in Computer Science, pages 310--319. Springer, 2005.
[11]
Wende Zhang, Yao-Jen Chang, and Tsuhan Chen. Optimal thresholding for key generation based on biometrics. In ICIP, pages 3451--3454, 2004.

Cited By

View all
  • (2024)Security of Biometric SystemsIntroduction to Biometrics10.1007/978-3-031-61675-4_9(343-397)Online publication date: 30-Oct-2024
  • (2024)Non-malleable Fuzzy ExtractorsApplied Cryptography and Network Security10.1007/978-3-031-54770-6_6(135-155)Online publication date: 1-Mar-2024
  • (2023)Breaking Free From Entropy’s Shackles: Cosine Distance-Sensitive Error Correction for Reliable Biometric CryptographyIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.327391918(3101-3115)Online publication date: 2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIACCS '07: Proceedings of the 2nd ACM symposium on Information, computer and communications security
March 2007
323 pages
ISBN:1595935746
DOI:10.1145/1229285
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 March 2007

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

Asia CCS07
Sponsor:

Acceptance Rates

ASIACCS '07 Paper Acceptance Rate 33 of 180 submissions, 18%;
Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)1
Reflects downloads up to 26 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Security of Biometric SystemsIntroduction to Biometrics10.1007/978-3-031-61675-4_9(343-397)Online publication date: 30-Oct-2024
  • (2024)Non-malleable Fuzzy ExtractorsApplied Cryptography and Network Security10.1007/978-3-031-54770-6_6(135-155)Online publication date: 1-Mar-2024
  • (2023)Breaking Free From Entropy’s Shackles: Cosine Distance-Sensitive Error Correction for Reliable Biometric CryptographyIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.327391918(3101-3115)Online publication date: 2023
  • (2023)A Review on Protection and Cancelable Techniques in Biometric SystemsIEEE Access10.1109/ACCESS.2023.323938711(8531-8568)Online publication date: 2023
  • (2023)General Constructions of Fuzzy Extractors for Continuous SourcesInformation Security and Cryptology10.1007/978-981-97-0942-7_9(163-182)Online publication date: 9-Dec-2023
  • (2020)A review on performance,security and various biometric template protection schemes for biometric authentication systemsMultimedia Tools and Applications10.1007/s11042-020-09197-7Online publication date: 29-Jul-2020
  • (2019)Continuous-Source Fuzzy Extractors: Source uncertainty and insecurity2019 IEEE International Symposium on Information Theory (ISIT)10.1109/ISIT.2019.8849421(2952-2956)Online publication date: Jul-2019
  • (2019)A Novel Blockchain Scheme Combining Prime Numbers and Iris for Encrypting Coding2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00117(609-618)Online publication date: Aug-2019
  • (2018)General Framework to Evaluate Unlinkability in Biometric Template Protection SystemsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2017.278800013:6(1406-1420)Online publication date: Jun-2018
  • (2018)It is All in the System's Parameters: Privacy and Security Issues in Transforming Biometric Raw Data into Binary StringsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2018.2804949(1-1)Online publication date: 2018
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media