A fuzzy sketch with trapdoor

In 1999, Juels and Wattenberg introduce an effective construction of Fuzzy Sketch, i.e., a way of handling errors into string verification. This allows them to consider data varying in time, such as, for instance, answers to a list of subjective questions. To this end, they use an error-correcting code. We show here how to embed a trapdoor into Fuzzy Sketches, reducing to authorized people the ability to correct errors and thus to verify the fuzzy equality to the Fuzzy Sketch.

[1]  Rafail Ostrovsky,et al.  Secure Remote Authentication Using Biometric Data , 2005, EUROCRYPT.

[2]  Gilles Zémor,et al.  Generalized coset schemes for the wire-tap channel: application to biometrics , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[3]  Nicolas Sendrier McEliece Public Key Cryptosystem , 2005, Encyclopedia of Cryptography and Security.

[4]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[5]  Amr M. Youssef,et al.  On the Existence of Resilient Functions , 2006 .

[6]  Xavier Boyen,et al.  Reusable cryptographic fuzzy extractors , 2004, CCS '04.

[7]  Anne Canteaut,et al.  A New Algorithm for Finding Minimum-Weight Words in a Linear Code: Application to McEliece’s Cryptosystem and to Narrow-Sense BCH Codes of Length , 1998 .

[8]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[9]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[10]  Thomas Johansson,et al.  On the complexity of some cryptographic problems based on the general decoding problem , 2002, IEEE Trans. Inf. Theory.

[11]  Yair Frankel,et al.  On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[12]  Madhu Sudan,et al.  Hardness of approximating the minimum distance of a linear code , 1999, IEEE Trans. Inf. Theory.

[13]  Gérard D. Cohen,et al.  The wiretap channel applied to biometrics , 2004 .

[14]  Henk Meijer,et al.  Security-related comments regarding McEliece's public-key cryptosystem , 1989, IEEE Trans. Inf. Theory.

[15]  Robert J. McEliece,et al.  A public key cryptosystem based on algebraic coding theory , 1978 .

[16]  Johan van Tilburg,et al.  On the McEliece Public-Key Cryptosystem , 1988, CRYPTO.

[17]  Ari Juels,et al.  Error-tolerant password recovery , 2001, CCS '01.

[18]  Ernest F. Brickell,et al.  An Observation on the Security of McEliece's Public-Key Cryptosystem , 1988, EUROCRYPT.