An Improved Robust Fuzzy Extractor


Autoria(s): Kanukurth, Bhavana
Data(s)

20/10/2011

20/10/2011

2009

Resumo

We consider the problem of building robust fuzzy extractors, which allow two parties holding similar random variables W, W' to agree on a secret key R in the presence of an active adversary. Robust fuzzy extractors were defined by Dodis et al. in Crypto 2006 [6] to be noninteractive, i.e., only one message P, which can be modified by an unbounded adversary, can pass from one party to the other. This allows them to be used by a single party at different points in time (e.g., for key recovery or biometric authentication), but also presents an additional challenge: what if R is used, and thus possibly observed by the adversary, before the adversary has a chance to modify P. Fuzzy extractors secure against such a strong attack are called post-application robust. We construct a fuzzy extractor with post-application robustness that extracts a shared secret key of up to (2m−n)/2 bits (depending on error-tolerance and security parameters), where n is the bit-length and m is the entropy of W . The previously best known result, also of Dodis et al., [6] extracted up to (2m − n)/3 bits (depending on the same parameters).

Identificador

Kanukurthi, Bhavana. "An Improved Robust Fuzzy Extractor (MA Thesis)", Technical Report BUCS-TR-2008-023, Computer Science Department, Boston University, September 12, 2008. [Available from: http://hdl.handle.net/2144/1716]

http://hdl.handle.net/2144/1716

Idioma(s)

en_US

Publicador

Boston University Computer Science Department

Relação

BUCS Technical Reports;BUCS-TR-2008-023

Tipo

Technical Report