Abstract
An overview was given of security applications where noisy data plays a substantial role. Secure Sketches and Fuzzy Extractors were discussed at tutorial level, and two simple Fuzzy Extractor constructions were shown. One of the latest developments was presented: quantum-readout PUFs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Carter, J.L., Wegman, M.N.: Universal classes of hash functions. J. of Computer and System Sciences 18(2), 143–154 (1979)
Dodis, Y., Reyzin, M., Smith, A.: Fuzzy Extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004)
Gassend, B., Clarke, D.E., van Dijk, M., Devadas, S.: Silicon Physical Unknown Functions. In: ACM CCS 2002, pp. 148–160 (2002)
Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: ACM CCS 1999, pp. 28–36 (1999)
Linnartz, J.P.M.G., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 238–250. Springer, Heidelberg (2003)
Pappu, R.: Physical One-Way Functions. PhD thesis, MIT (2001)
Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical One-Way Functions. Science 297, 2026–2030 (2002)
Tuyls, P., Škorić, B., Kevenaar, T.: Security with Noisy Data. Springer, Heidelberg (2007)
Verbitskiy, E.A., Tuyls, P., Obi, C., Schoenmakers, L.A.M., Škorić, B.: Key extraction from general non-discrete signals. IEEE Trans. Inf. Forensics and Security 5(2), 269–279 (2010)
Škorić, B.: Quantum Readout of Physical Unclonable Functions. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 369–386. Springer, Heidelberg (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Škorić, B. (2010). Security with Noisy Data. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds) Information Hiding. IH 2010. Lecture Notes in Computer Science, vol 6387. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16435-4_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-16435-4_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16434-7
Online ISBN: 978-3-642-16435-4
eBook Packages: Computer ScienceComputer Science (R0)