Security with Noisy Data (eBook)
XVI, 340 Seiten
Springer London (Verlag)
978-1-84628-984-2 (ISBN)
Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data. It provides a comprehensive overview of the theory of extracting cryptographic keys from noisy data, and describes applications in the field of biometrics, secure key storage, and anti-counterfeiting.
Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data.It covers both the theory of authentication based on noisy data and shows it in practice as a key tool for prevention of counterfeiting. Biometrics and physical unclonable functions are discussed extensively. Key new technologies discussed include: -Algorithms to derive secure keys form noisy data in particular from Physical Unclonable Functions and Biometrics, - also the theory which proves that those algorithms are secure is made accessible; Practical Implementations of the above mentioned algorithms; - Techniques that give insight in the security of those systems in practice; An overview and detailed description of new applications that become possible by using these new algorithms.This book can serve as a starting point for PhD students entering the field and will also benefit professionals.
Foreword 5
Acknowledgments 8
Contents 9
Contributors 11
1 Introduction 14
1.1 An Introduction to Security with Noisy Data 14
1.2 An Introduction to Biometrics 18
1.3 An Introduction to Physical Unclonable Functions 22
1.4 Overview of the Book 27
Theory of Security with Noisy Data 31
2 Unbreakable Keys from Random Noise 32
2.1 Information-Theoretic Cryptographic Security 32
2.2 Smooth Renyi Entropies 37
2.3 Information-Theoretic Reductions 38
2.4 Turning Correlated Randomness into Keys 45
2.5 Secrecy from Completely Insecure Communication 53
3 Fuzzy Commitment 56
3.1 Introduction 56
3.2 A Description of Fuzzy Commitment 56
3.3 Biometrics 60
3.4 Knowledge-Based Authentication 64
3.5 Beyond Fuzzy Commitment 66
4 A Communication-Theoretical View on Secret Extraction 68
4.1 Introduction 68
4.2 Preliminaries 69
4.3 Model: Biometrics as Random Codewords 70
4.4 Identification Capacity 72
4.5 Proof Outline for Theorem 4.1 73
4.6 Hypothesis Testing Maximum Likelihood
4.7 Private Templates 78
4.8 Secrecy and Identification Capacity 84
4.9 Relation with Fuzzy Extractors 87
4.10 Conclusion 88
5 Fuzzy Extractors 89
5.1 Motivation 89
5.2 Basic Definitions 91
5.3 Basic Constructions 94
5.4 Improving Error-Tolerance via Relaxed Notions of Correctness 100
5.5 Strong Privacy Guarantees 102
5.6 Robustness and Protection Against Active Attacks 106
6 Robust and Reusable Fuzzy Extractors 110
6.1 Introduction 110
6.2 Background and Definitions 113
6.3 Flexible Error Models 114
6.4 Practical Robustness 115
6.5 Toward Reusability 119
6.6 Summary 121
7 Fuzzy Identities and Attribute-Based Encryption 122
7.1 Introduction 122
7.2 Preliminaries 126
7.3 Other Approaches 128
7.4 Our Construction 128
7.5 Large-Universe Construction 131
7.6 Conclusions 133
7.7 Applications Beyond Biometrics 134
8 Unconditionally Secure Multiparty Computation from Noisy Resources 135
8.1 Introduction 135
8.2 Preliminaries 138
8.3 Monotones 141
8.4 Bit Commitment from Noise 142
8.5 Oblivious Transfer from Noise 143
8.6 Pseudo-Signatures and Broadcast from Noise 145
8.7 More Realistic Models 146
9 Computationally Secure Authentication with Noisy Data 148
9.1 Introduction 148
9.2 Exact Secure Matching 150
9.3 Approximate Secure Matching 154
9.4 Conclusion 156
Applications of Security with Noisy Data 157
10 Privacy Enhancements for Inexact Biometric Templates 158
10.1 Introduction 158
10.2 Related Work 159
10.3 Hashing or Encrypting Biometric Data 162
10.4 Cancelable Biometrics 166
10.5 Discussion 172
11 Protection of Biometric Information 174
11.1 Introduction 174
11.2 Privacy Threats of Biometrics 179
11.3 Requirements for Template Protection 180
11.4 An Architecture for Biometric Template Protection 182
11.5 Quantization of Biometric Measurements 184
11.6 Security and Privacy Considerations 191
11.7 Application Examples of Template-Protected Biometric Systems 193
11.8 Conclusions 198
12 On the Amount of Entropy in PUFs 199
12.1 Introduction 199
12.2 Information-Theoretic Framework 201
12.3 Information Theory of Optical PUFs 204
12.4 Information Theory of Coating PUFs 209
13 Entropy Estimation for Optical PUFs Based on Context- Tree Weighting Methods 220
13.1 Generating a Shared Secret Key 220
13.2 Physical Unclonable Functions 222
13.3 Entropy of a Two-Dimensional Stationary Process 222
13.4 Conditional Entropy of a Two-Dimensional Stationary Process Given a Second One 225
13.5 Mutual Information Estimation: Convergence 227
13.6 The Maurer Scheme in the Ergodic Case 228
13.7 Context-Tree Weighting Methods 228
13.8 Analysis of Speckle Patterns 230
13.9 Conclusions 235
14 Controlled Physical Random Functions 237
14.1 Introduction 237
14.2 CPUF Primitives 243
14.3 Challenge Response Pair Management 249
14.4 Certified Execution 253
14.5 Conclusion 254
15 Experimental Hardware for Coating PUFs and Optical PUFs 256
15.1 Introduction 256
15.2 Coating PUF Test ICs 257
15.3 Bare Optical PUFs 265
15.4 Integrated Optical PUF 267
16 Secure Key Storage with PUFs 270
16.1 Introduction 270
16.2 PUFs for Read-Proof Hardware 273
16.3 Cryptographic Preliminaries 276
16.4 Secure Key Storage with Optical PUFs 278
16.5 Key Extraction from Speckle Patterns 279
16.6 Secure Key Storage with Coating PUFs 284
17 Anti-Counterfeiting 294
17.1 Introduction 294
17.2 Model 297
17.3 Unclonable RFID Tags 300
17.4 Secure Identification Protocols 306
17.5 ECC Implementations for RFID 306
17.6 Results and discussion 311
References 314
Index 333
Erscheint lt. Verlag | 24.10.2007 |
---|---|
Zusatzinfo | XVI, 340 p. |
Verlagsort | London |
Sprache | englisch |
Themenwelt | Mathematik / Informatik ► Informatik ► Programmiersprachen / -werkzeuge |
Informatik ► Theorie / Studium ► Kryptologie | |
Naturwissenschaften | |
Schlagworte | Algorithm analysis and problem complexity • algorithms • Anti-counterfeiting • Communication • cryptography • Data Security • Entropy estimation • Fuzzy commitment • Fuzzy extractor • Fuzzy ID-based encryption • Information • Physical unclonable function (PUF) • privacy • Privacy amplification • Private biometrics • RFID-Tag • Secure key storage |
ISBN-10 | 1-84628-984-X / 184628984X |
ISBN-13 | 978-1-84628-984-2 / 9781846289842 |
Haben Sie eine Frage zum Produkt? |
Größe: 12,1 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich