A trivial debiasing scheme for Helper Data Systems

We introduce a debiasing scheme that solves the more noise than entropy problem which can occur in Helper Data Systems when the source is very biased. We perform a condensing step, similar to Index-Based Syndrome coding, that reduces the size of the source space in such a way that some source entropy is lost, while the noise entropy is greatly reduced. In addition, our method allows for even more entropy extraction by means of a ‘spamming’ technique. Our method outperforms solutions based on the one-pass and two-pass von Neumann algorithms.

[1]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[2]  David Naccache,et al.  Towards Hardware-Intrinsic Security - ReadingSample , 2017 .

[3]  Wei Wu,et al.  Entropy loss in PUF-based key generation schemes: The repetition code pitfall , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[4]  Roel Maes,et al.  Physically Unclonable Functions , 2012, Springer Berlin Heidelberg.

[5]  Maximilian Hofer,et al.  Physical Unclonable Functions in Theory and Practice , 2012 .

[6]  Srinivas Devadas,et al.  Secure and robust error correction for physical unclonable functions , 2010, IEEE Design & Test of Computers.

[7]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[8]  Roel Maes,et al.  Physically Unclonable Functions , 2013, Springer Berlin Heidelberg.

[9]  Blaise L. P. Gassend,et al.  Physical random functions , 2003 .

[10]  Thomas M. Cover,et al.  Elements of information theory (2. ed.) , 2006 .

[11]  Thomas M. Cover,et al.  Elements of Information Theory: Cover/Elements of Information Theory, Second Edition , 2005 .

[12]  Boris Skoric,et al.  Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting , 2007 .

[13]  Boris Skoric,et al.  The Spammed Code Offset Method , 2014, IEEE Transactions on Information Forensics and Security.

[14]  Gilles Brassard,et al.  Practical Quantum Oblivious Transfer , 1991, CRYPTO.

[15]  Frans M. J. Willems,et al.  Secure Key Generation from Biased PUFs , 2015, CHES.

[16]  Boris Skoric,et al.  Read-Proof Hardware from Protective Coatings , 2006, CHES.

[17]  George Pâolya,et al.  Applied Combinatorial Mathematics , 1964 .

[18]  K. A. Rybnikov,et al.  Applied Combinatorial Mathematics , 1964 .

[19]  Xavier Boyen,et al.  Reusable cryptographic fuzzy extractors , 2004, CCS '04.

[20]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[21]  Frans M. J. Willems,et al.  Information Leakage in Fuzzy Commitment Schemes , 2010, IEEE Transactions on Information Forensics and Security.

[22]  Omer Paneth,et al.  Reusable Fuzzy Extractors for Low-Entropy Distributions , 2016, Journal of Cryptology.