Embedding Renewable Cryptographic Keys into Continuous Noisy Data

I.R. Buhan, J.M. Doumen, Pieter H. Hartel, Qiang Tang, Raymond N.J. Veldhuis

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    10 Citations (Scopus)
    22 Downloads (Pure)

    Abstract

    Fuzzy extractor is a powerful but theoretical tool to extract uniform strings from discrete noisy data. Before it can be used in practice, many concerns need to be addressed in advance, such as making the extracted strings renewable and dealing with continuous noisy data. We propose a primitive fuzzy embedder as a practical replacement for fuzzy extractor. Fuzzy embedder naturally supports renewability because it allows a randomly chosen string to be embedded. Fuzzy embedder takes continuous noisy data as input and its performance directly links to the property of the input data. We give a general construction for fuzzy embedder based on the technique of Quantization Index Modulation (QIM) and derive the performance result in relation to that of the underlying QIM. In addition, we show that quantization in 2-dimensional space is optimal from the perspective of the length of the embedded string. We also present a concrete construction for fuzzy embedder in 2-dimensional space and compare its performance with that obtained by the 4-square tiling method of Linnartz, et al. [13].
    Original languageUndefined
    Title of host publication10th International Conference on Information and Communications Security
    Place of PublicationBerlin
    PublisherSpringer
    Pages294-310
    Number of pages17
    ISBN (Print)978-3-540-88624-2
    DOIs
    Publication statusPublished - Oct 2008
    Event10th International Conference on Information and Communications Security, ICICS 2008 - Hyatt Regency, Birmingham, United Kingdom
    Duration: 20 Oct 200822 Oct 2008
    Conference number: 10
    http://events.cs.bham.ac.uk/icics08/

    Publication series

    NameLecture Notes in Computer Science
    PublisherSpringer
    Number08HT8968C
    Volume5308

    Conference

    Conference10th International Conference on Information and Communications Security, ICICS 2008
    Abbreviated titleICICS
    CountryUnited Kingdom
    CityBirmingham
    Period20/10/0822/10/08
    Internet address

    Keywords

    • SCS-Cybersecurity
    • SCS-Safety
    • METIS-252065
    • EWI-13623
    • IR-59979

    Cite this

    Buhan, I. R., Doumen, J. M., Hartel, P. H., Tang, Q., & Veldhuis, R. N. J. (2008). Embedding Renewable Cryptographic Keys into Continuous Noisy Data. In 10th International Conference on Information and Communications Security (pp. 294-310). (Lecture Notes in Computer Science; Vol. 5308, No. 08HT8968C). Berlin: Springer. https://doi.org/10.1007/978-3-540-88625-9_20