Embedding renewable cryptographic keys into noisy data

  • Authors:
  • Ileana Buhan;Jeroen Doumen;Pieter Hartel;Qian Tang;Raymond Veldhuis

  • Affiliations:
  • Philips Research Laboratories, Information and System Security, High Tech Campus 34, Room 6.33, Eindhoven, The Netherlands;Irdeto Research, Flight Forum 89, 5657 DC, Eindhoven, The Netherlands;University of Twente, Distributed and Embedded Security, Faculty of EEMCS, P.O. Box 217, 7500 AE, Enschede, The Netherlands;University of Twente, Distributed and Embedded Security, Faculty of EEMCS, P.O. Box 217, 7500 AE, Enschede, The Netherlands;University of Twente, Signals and Systems Group, Electrical Engineering, P.O. Box 217, 7500 AE, Enschede, The Netherlands

  • Venue:
  • International Journal of Information Security
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

A fuzzy extractor is a powerful but theoretical tool that can be used to extract uniform strings from (discrete) noisy sources. However, when using a fuzzy extractor in practice, extra features are needed, such as the renewability of the extracted strings and the ability to use the fuzzy extractor directly on continuous input data instead of discrete data. Our contribution is threefold. Firstly, we propose a fuzzy embedder as a generalization of the fuzzy extractor. A fuzzy embedder naturally supports renewability, as it allows a string to be embedded instead of extracted. It also supports direct analysis of quantization effects, as it makes no limiting assumptions about the nature of the input source. Secondly, we give a general construction for fuzzy embedders based on the technique of quantization index modulation (QIM). We show that the performance measures of a QIM, as proposed by the watermarking community, translate directly to the security properties of the corresponding fuzzy embedder. Finally, we show that from the perspective of the length of the embedded string, quantization in two dimensions is optimal. We present two practical constructions for a fuzzy embedder in two-dimensional space. The first construction is optimal from reliability perspective, and the second construction is optimal in the length of the embedded string.