翻訳と辞書
Words near each other
・ FVPR El Olivo
・ FVT
・ FVWM
・ FVWM-Crystal
・ FVWM95
・ FW
・ FW de Klerk Foundation
・ FWA
・ FWA Footballer of the Year
・ Fwa River
・ Fuzzy Duck (album)
・ Fuzzy Duck (band)
・ Fuzzy Duck (drinking game)
・ Fuzzy electronics
・ Fuzzy Ergo Sum
Fuzzy extractor
・ Fuzzy Felt
・ Fuzzy finite element
・ Fuzzy foot
・ Fuzzy game
・ Fuzzy Haskins
・ Fuzzy Knight
・ Fuzzy Knights
・ Fuzzy locating system
・ Fuzzy logic
・ Fuzzy Logic (album)
・ Fuzzy Logic (David Benoit album)
・ Fuzzy logic (disambiguation)
・ Fuzzy Logic Recordings
・ Fuzzy Logix


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Fuzzy extractor : ウィキペディア英語版
Fuzzy extractor

Fuzzy extractors convert biometric data into random strings, which makes it possible to apply cryptographic techniques for biometric security. They are used to encrypt and authenticate users records, with biometric inputs as a key. Historically, the first biometric system of this kind was designed by Juels and Wattenberg and was called "Fuzzy commitment", where the cryptographic key is decommitted using biometric data. "Fuzzy", in that context, implies that the value close to the original one can extract the committed value. Later, Juels and Sudan came up with (Fuzzy vault ) schemes which are order invariant for the fuzzy commitment scheme but uses a Reed–Solomon code. Codeword is evaluated by polynomial and the secret message is inserted as the coefficients of the polynomial. The polynomial is evaluated for different values of a set of features of the biometric data. So Fuzzy commitment and Fuzzy Vault were per-cursor to Fuzzy extractors.
Fuzzy extractor is a biometric tool to authenticate a user using its own biometric template as a key. They extract uniform and random string R from its input w that has tolerance for noise. If the input changes to w' but is still close to w , the string R can still be re-constructed. When R is used first time to re-construct, it outputs a helper string P which can be made public without compromising the security of R (used for encryption and authentication key) and P (helper string) is stored to recover R . They remain secure even when the adversary modifies P (key agreement between a user and a server based only on a biometric input).
This article is based on the papers "Fuzzy Extractors: A Brief Survey of Results from 2004 to 2006" and "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data" by Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin and Adam Smith
==Motivation==
As fuzzy extractors deal with how to generate strong keys from Biometrics and other Noisy Data, it applies cryptography paradigms to biometric data and that means (1) Make little assumptions about the biometric data (these data comes from variety of sources and don't want adversary to exploit that so it is best to assume the input is unpredictable) (2) Apply cryptographic application techniques to the input. (for that fuzzy extractor converts biometric data into secret, uniformly random and reliably reproducible random string).
According to "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data" paper by Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin and Adam Smith – these techniques also have other broader applications (when noisy inputs are used) such as human memory, images used as passwords, keys from quantum channel. Based on the Differential Privacy paper by Cynthia Dwork (ICALP 2006) – fuzzy extractors have application in the proof of impossibility of strong notions of privacy for statistical databases.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Fuzzy extractor」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.