Fuzzy extractors for continuous distributions

Report OPEN
Buhan, I.R.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.;
(2006)
  • Publisher: Centrum voor Telematica en Informatie Technologie
  • Subject: IR-59966 | EWI-7693 | SCS-Safety | SCS-Cybersecurity | METIS-237416
    arxiv: Computer Science::Computer Vision and Pattern Recognition | Computer Science::Cryptography and Security

We show that there is a direct relation between the maximum length of the keys extracted from biometric data and the error rates of the biometric system. The length of the bio-key depends on the amount of distinguishing information that can be extracted from the source ... View more
  • References (9)

    [1] Ruud Bolle, Jonathan Connell, Sharanthchandra Pankanti, Nalini Ratha, and Andrew Senior. Guide to Biometrics. SpringerVerlag, 2003.

    [2] Xavier Boyen. Reusable cryptographic fuzzy extractors. In Vijayalakshmi Atluri, Birgit Pfitzmann, and Patrick Drew McDaniel, editors, ACM Conference on Computer and Communications Security, pages 82-91. ACM, 2004.

    [3] Yao-Jen Chang, Wende Zhang, and Tsuhan Chen. Biometrics-based cryptographic key generation. In ICME, pages 2203-2206. IEEE, 2004.

    [4] Yevgeniy Dodis, Leonid Reyzin, and Adam Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Christian Cachin and Jan Camenisch, editors, EUROCRYPT, volume 3027 of Lecture Notes in Computer Science, pages 523-540. Springer, 2004.

    [5] Jean-Paul M. G. Linnartz and Pim Tuyls. New shielding functions to enhance privacy and prevent misuse of biometric templates. In Josef Kittler and Mark S. Nixon, editors, AVBPA, volume 2688 of Lecture Notes in Computer Science, pages 393-402. Springer, 2003.

    [6] Fabian Monrose, Michael K. Reiter, Qi Li, and Susanne Wetzel. Cryptographic key generation from voice. In IEEE Symposium on Security and Privacy, pages 202-213, 2001.

    [7] Pim Tuyls, Anton H. M. Akkermans, Tom A. M. Kevenaar, Geert Jan Schrijen, Asker M. Bazen, and Raymond N. J. Veldhuis. Practical biometric authentication with template protection. In Takeo Kanade, Anil K. Jain, and Nalini K. Ratha, editors, AVBPA, volume 3546 of Lecture Notes in Computer Science, pages 436-446. Springer, 2005.

    [8] Umut Uludag, Sharath Pankanti, and Anil K. Jain. Fuzzy vault for fingerprints. In Takeo Kanade, Anil K. Jain, and Nalini K. Ratha, editors, AVBPA, volume 3546 of Lecture Notes in Computer Science, pages 310- 319. Springer, 2005.

    [9] Wende Zhang, Yao-Jen Chang, and Tsuhan Chen. Optimal thresholding for key generation based on biometrics. In ICIP, pages 3451-3454, 2004.

  • Metrics
Share - Bookmark