Paper 2013/527

The Spammed Code Offset Method

Boris Skoric and Niels de Vreede

Abstract

Helper data schemes are a security primitive used for privacy-preserving biometric databases and Physical Unclonable Functions. One of the oldest known helper data schemes is the Code Offset Method (COM). We propose an extension of the COM: the helper data is accompanied by many instances of fake helper data that are drawn from the same distribution as the real one. While the adversary has no way to distinguish between them, the legitimate party has more information and {\em can} see the difference. We use an LDPC code in order to improve the efficiency of the legitimate party's selection procedure. Our construction provides a new kind of trade-off: more effective use of the source entropy, at the price of increased helper data storage. We give a security analysis in terms of Shannon entropy and order-2 Renyi entropy. We also propose a variant of our scheme in which the helper data list is not stored but pseudorandomly generated, changing the trade-off to source entropy utilization vs. computation effort.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
PUFhelper datacode offset constructioncode offset methodfuzzy extractorsecure sketch
Contact author(s)
b skoric @ tue nl
History
2014-01-07: revised
2013-08-30: received
See all versions
Short URL
https://ia.cr/2013/527
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2013/527,
      author = {Boris Skoric and Niels de Vreede},
      title = {The Spammed Code Offset Method},
      howpublished = {Cryptology {ePrint} Archive, Paper 2013/527},
      year = {2013},
      url = {https://eprint.iacr.org/2013/527}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.