Embedding Renewable Cryptographic Keys into Noisy Data

I.R. Buhan, J.M. Doumen, Pieter H. Hartel, Qiang Tang, Raymond N.J. Veldhuis

    Research output: Contribution to journalArticleAcademicpeer-review

    5 Citations (Scopus)

    Abstract

    A fuzzy extractor is a powerful but theoretical tool that can be used to extract uniform strings from (discrete) noisy sources. However, when using a fuzzy extractor in practice, extra features are needed, such as the renewability of the extracted strings and the ability to use the fuzzy extractor directly on continuous input data instead of discrete data. Our contribution is threefold. Firstly, we propose a fuzzy embedder as a generalization of the fuzzy extractor. A fuzzy embedder naturally supports renewability, as it allows a string to be embedded instead of extracted. It also supports direct analysis of quantization effects, as it makes no limiting assumptions about the nature of the input source. Secondly, we give a general construction for fuzzy embedders based on the technique of quantization index modulation (QIM). We show that the performance measures of a QIM, as proposed by the watermarking community, translate directly to the security properties of the corresponding fuzzy embedder. Finally, we show that from the perspective of the length of the embedded string, quantization in two dimensions is optimal. We present two practical constructions for a fuzzy embedder in two-dimensional space. The first construction is optimal from reliability perspective, and the second construction is optimal in the length of the embedded string.
    Original languageUndefined
    Article number10.1007/s10207-010-0103-4
    Pages (from-to)193-208
    Number of pages16
    JournalInternational journal of information security
    Volume9
    Issue number3
    DOIs
    Publication statusPublished - Jun 2010
    Event10th International Conference on Information and Communications Security, ICICS 2008 - Hyatt Regency, Birmingham, United Kingdom
    Duration: 20 Oct 200822 Oct 2008
    Conference number: 10
    http://events.cs.bham.ac.uk/icics08/

    Keywords

    • EWI-17965
    • Sphere packing
    • Cryptographic keys
    • Biometrics
    • IR-71586
    • METIS-279105
    • SCS-Safety
    • SCS-Cybersecurity
    • DIES-Data Security

    Cite this