-
arXiv:1001.4992 [pdf, ps, other]
RFID Key Establishment Against Active Adversaries
Abstract: We present a method to strengthen a very low cost solution for key agreement with a RFID device. Starting from a work which exploits the inherent noise on the communication link to establish a key by public discussion, we show how to protect this agreement against active adversaries. For that purpose, we unravel integrity $(I)$-codes suggested by Cagalj et al. No preliminary key distribution… ▽ More
Submitted 28 January, 2010; v1 submitted 27 January, 2010; originally announced January 2010.
Comments: This work was presented at the First IEEE Workshop on Information Forensics and Security (WIFS'09) (update including minor remarks and references to match the presented version)
-
arXiv:1001.2463 [pdf, ps, other]
On the Threshold of Maximum-Distance Separable Codes
Abstract: Starting from a practical use of Reed-Solomon codes in a cryptographic scheme published in Indocrypt'09, this paper deals with the threshold of linear $q$-ary error-correcting codes. The security of this scheme is based on the intractability of polynomial reconstruction when there is too much noise in the vector. Our approach switches from this paradigm to an Information Theoretical point of vie… ▽ More
Submitted 14 January, 2010; originally announced January 2010.
Comments: Sumitted to ISIT 2010
-
arXiv:0901.1062 [pdf, ps, other]
Identification with Encrypted Biometric Data
Abstract: Biometrics make human identification possible with a sample of a biometric trait and an associated database. Classical identification techniques lead to privacy concerns. This paper introduces a new method to identify someone using his biometrics in an encrypted way. Our construction combines Bloom Filters with Storage and Locality-Sensitive Hashing. We apply this error-tolerant scheme, in a Ham… ▽ More
Submitted 7 September, 2009; v1 submitted 8 January, 2009; originally announced January 2009.
Comments: An extended abstract -- entitled "Error-Tolerant Searchable Encryption" -- of this work has been accepted to and will be presented at the Communication and Information Systems Security Symposium, International Conference on Communications (ICC) 2009, June 14-18, Germany. This paper is the full version. Submitted for publication
-
arXiv:0705.3740 [pdf, ps, other]
Optimal Iris Fuzzy Sketches
Abstract: Fuzzy sketches, introduced as a link between biometry and cryptography, are a way of handling biometric data matching as an error correction issue. We focus here on iris biometrics and look for the best error-correcting code in that respect. We show that two-dimensional iterative min-sum decoding leads to results near the theoretical limits. In particular, we experiment our techniques on the Iri… ▽ More
Submitted 25 May, 2007; originally announced May 2007.
Comments: 9 pages. Submitted to the IEEE Conference on Biometrics: Theory, Applications and Systems, 2007 Washington DC
ACM Class: E.3; E.4
Journal ref: Biometrics: Theory, Applications, and Systems, 2007. BTAS 2007. First IEEE International Conference on