36
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references25

          • Record: found
          • Abstract: found
          • Article: found
          Is Open Access

          Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data

          , , (2008)
          We provide formal definitions and efficient secure techniques for - turning noisy information into keys usable for any cryptographic application, and, in particular, - reliably and securely authenticating biometric data. Our techniques apply not just to biometric information, but to any keying material that, unlike traditional cryptographic keys, is (1) not reproducible precisely and (2) not distributed uniformly. We propose two primitives: a "fuzzy extractor" reliably extracts nearly uniform randomness R from its input; the extraction is error-tolerant in the sense that R will be the same even if the input changes, as long as it remains reasonably close to the original. Thus, R can be used as a key in a cryptographic application. A "secure sketch" produces public information about its input w that does not reveal w, and yet allows exact recovery of w given another value that is close to w. Thus, it can be used to reliably reproduce error-prone biometric inputs without incurring the security risk inherent in storing them. We define the primitives to be both formally secure and versatile, generalizing much prior work. In addition, we provide nearly optimal constructions of both primitives for various measures of ``closeness'' of input data, such as Hamming distance, edit distance, and set difference.
            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            Silicon physical random functions

              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates

                Bookmark

                Author and article information

                Journal
                IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
                IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst.
                Institute of Electrical and Electronics Engineers (IEEE)
                0278-0070
                1937-4151
                June 2015
                June 2015
                : 34
                : 6
                : 889-902
                Article
                10.1109/TCAD.2014.2370531
                4b4f26c3-62bd-4b30-80e0-d2688d79acbd
                © 2015
                History

                Comments

                Comment on this article