Fuzzy extractors are a method that allows
biometric
Biometrics are body measurements and calculations related to human characteristics. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify ...
data to be used as inputs to standard
cryptographic
Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
techniques, to enhance computer security. "Fuzzy", in this context, refers to the fact that the fixed values required for
cryptography
Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adve ...
will be extracted from values close to but not identical to the original key, without compromising the security required. One application is to
encrypt
In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
and
authenticate
Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicati ...
users records, using the biometric inputs of the user as a key.
Fuzzy extractors are a biometric tool that allows for user authentication, using a biometric template constructed from the user's biometric data as the key, by extracting a uniform and random string
from an input
, with a tolerance for noise. If the input changes to
but is still close to
, the same string
will be re-constructed. To achieve this, during the initial computation of
the process also outputs a helper string
which will be stored to recover
later and can be made public without compromising the security of
. The security of the process is also ensured when an
adversary
An adversary is generally considered to be a person, group, or force that opposes and/or attacks.
Adversary may also refer to:
* Satan ("adversary" in Hebrew), in Judeo-Christian religion
Entertainment Fiction
* Adversary (comics), villain fr ...
modifies
. Once the fixed string
has been calculated, it can be used, for example, for key agreement between a user and a server based only on a biometric input.
[Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, and Adam Smith]
"Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data"
2008.
History
One precursor to fuzzy extractors was the so-called "Fuzzy Commitment", as designed by Juels and Wattenberg.
Here, the cryptographic key is decommited using biometric data.
Later, Juels and
Sudan came up wit
Fuzzy vaultschemes. These are order invariant for the fuzzy commitment scheme and use a
Reed–Solomon error correction
Reed–Solomon codes are a group of error-correcting codes that were introduced by Irving S. Reed and Gustave Solomon in 1960.
They have many applications, the most prominent of which include consumer technologies such as MiniDiscs, CDs, DVDs, Bl ...
code. The code word is inserted as the coefficients of a polynomial, and this polynomial is then evaluated with respect to various properties of the biometric data.
Both Fuzzy Commitment and Fuzzy Vaults were precursors to Fuzzy Extractors.
Motivation
In order for fuzzy extractors to generate strong keys from biometric and other noisy data, cryptography paradigms will be applied to this biometric data. These paradigms:
(1) Limit the number of assumptions about the content of the biometric data (this data comes from a variety of sources; so, in order to avoid exploitation by an
adversary
An adversary is generally considered to be a person, group, or force that opposes and/or attacks.
Adversary may also refer to:
* Satan ("adversary" in Hebrew), in Judeo-Christian religion
Entertainment Fiction
* Adversary (comics), villain fr ...
, it's best to assume the input is unpredictable).
(2) Apply usual cryptographic techniques to the input. (Fuzzy extractors convert biometric data into secret, uniformly random, and reliably reproducible random strings.)
These techniques can also have other broader applications for other type of noisy inputs such as approximative data from human
memory
Memory is the faculty of the mind by which data or information is encoded, stored, and retrieved when needed. It is the retention of information over time for the purpose of influencing future action. If past events could not be remembered ...
, images used as passwords, and keys from quantum channels.
Fuzzy extractors also have applications in the
proof of impossibility
In mathematics, a proof of impossibility is a proof that demonstrates that a particular problem cannot be solved as described in the claim, or that a particular set of problems cannot be solved in general. Such a case is also known as a negative p ...
of the strong notions of privacy with regard to statistical databases.
Basic definitions
Predictability
Predictability indicates the probability that an adversary can guess a secret key. Mathematically speaking, the predictability of a random variable
is