Our construction provides a new kind of trade-off: more effective use of the source entropy, at the price of increased helper data storage. We give a security analysis in terms of Shannon entropy and order-2 Renyi entropy. We also propose a variant of our scheme in which the helper data list is not stored but pseudorandomly generated, changing the trade-off to source entropy utilization vs. computation effort.
Category / Keywords: PUF, helper data, code offset construction, code offset method, fuzzy extractor, secure sketch Date: received 23 Aug 2013, last revised 7 Jan 2014 Contact author: b skoric at tue nl Available format(s): PDF | BibTeX Citation Version: 20140107:210906 (All versions of this report) Short URL: ia.cr/2013/527 Discussion forum: Show discussion | Start new discussion