Cryptography traditionally relies on uniformly distributed and precisely reproducible random strings for its secrets, however, it is difficult to create, store, and reliably retrieve such strings. To securely derive cryptographic keys from a noisy input such as biometric data, two primitives are introduced by Y. Dodis et.al.: a secure sketch which allows recovery of a noisy input given a “close” approximation thereof, and a fuzzy extractor which extracts a uniformly distributed string from this noisy input in an error-tolerant manner. Both primitives work by constructing a “public” string which is used to encode the information needed for error-tolerant reconstruction of the original input and subsequent extraction. The public string, when transmitted over an insecure channel or stored in an insecure storage, can be modified by an adversary. A robust secure sketch and a robust fuzzy extractor mean that the public string can be authenticated by a receiver, if the authenticity of public string is verified by using, in some way, recovered string in secure sketch or extracted string in fuzzy extractor, we say that the authentication has circularity in it. In this paper, we propose a fully robust fuzzy extractor based on an error-correcting code, in which the public string can be authenticated by the receiver using his own a part of string that is close to sender's string under some metric, thus the circularity in authentication can be broken fully. The security is proven in standard model.
[1]
Xavier Boyen,et al.
Reusable cryptographic fuzzy extractors
,
2004,
CCS '04.
[2]
Stefan Wolf,et al.
Information-theoretically and computationally secure key agreement in cryptography
,
1999
.
[3]
Rafail Ostrovsky,et al.
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
,
2004,
SIAM J. Comput..
[4]
Carles Padró,et al.
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
,
2008,
EUROCRYPT.
[5]
Rafail Ostrovsky,et al.
Secure Remote Authentication Using Biometric Data
,
2005,
EUROCRYPT.
[6]
Jonathan Katz,et al.
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
,
2006,
CRYPTO.
[7]
Jaikumar Radhakrishnan,et al.
Bounds for Dispersers, Extractors, and Depth-Two Superconcentrators
,
2000,
SIAM J. Discret. Math..