## Cryptology ePrint Archive: Report 2014/243

**Key Derivation From Noisy Sources With More Errors Than Entropy**

*Ran Canetti and Benjamin Fuller and Omer Paneth and Leonid Reyzin*

**Abstract: **Fuzzy extractors convert a noisy source of entropy into a consistent uniformly-distributed key. In the process of eliminating noise, they lose some of the entropy of the original source---in the worst case, as much as the logarithm of the number of correctable error patterns. We call what is left after this worst-case loss the minimum usable entropy. Unfortunately, this quantity is negative for some sources that are important in practice. Most known approaches for building fuzzy extractors work in the worst case and cannot be used when the minimum usable entropy is negative.

We construct the first fuzzy extractors that work for a large class of distributions that have negative minimum usable entropy. Their security is computational. They correct Hamming errors over a large alphabet. In order to avoid the worst-case loss, they necessarily restrict distributions for which they work.

Our first construction requires high individual entropy of a constant fraction of symbols, but permits symbols to be dependent. Our second construction requires a constant fraction of symbols to have a constant amount of entropy conditioned on prior symbols. The constructions can be implemented efficiently based on number-theoretic assumptions or assumptions on cryptographic hash functions.

**Category / Keywords: **foundations / fuzzy extractors, key derivation, error-correcting codes, computational entropy, point obfuscation

**Date: **received 6 Apr 2014

**Contact author: **bfuller at cs bu edu

**Available format(s): **PDF | BibTeX Citation

**Note: **In submission.

**Version: **20140418:044857 (All versions of this report)

**Discussion forum: **Show discussion | Start new discussion

[ Cryptology ePrint archive ]