Key Extraction From General Nondiscrete Signals
- 29 March 2010
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Information Forensics and Security
- Vol. 5 (2), 269-279
- https://doi.org/10.1109/tifs.2010.2046965
Abstract
We address the problem of designing optimal schemes for the generation of secure cryptographic keys from continuous noisy data. We argue that, contrary to the discrete case, a universal fuzzy extractor does not exist. This implies that in the continuous case, key extraction schemes have to be designed for particular probability distributions. We extend the known definitions of the correctness and security properties of fuzzy extractors. Our definitions apply to continuous as well as discrete variables. We propose a generic construction for fuzzy extractors from noisy continuous sources, using independent partitions. The extra freedom in the choice of discretization, which does not exist in the discrete case, is advantageously used to give the extracted key a uniform distribution. We analyze the privacy properties of the scheme and the error probabilities in a one-dimensional toy model with simplified noise. Finally, we study the security implications of incomplete knowledge of the source's probability distribution P. We derive a bound on the min-entropy of the extracted key under the worst-case assumption, where the attacker knows P exactly.Keywords
This publication has 8 references indexed in Scilit:
- Fuzzy extractors for continuous distributionsPublished by Association for Computing Machinery (ACM) ,2007
- Read-Proof Hardware from Protective CoatingsLecture Notes in Computer Science, 2006
- Reconciliation of a Quantum-Distributed Gaussian KeyIEEE Transactions on Information Theory, 2004
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy DataLecture Notes in Computer Science, 2004
- Physical One-Way FunctionsScience, 2002
- Convergence rates for density estimation with Bernstein polynomialsThe Annals of Statistics, 2001
- Security of continuous-variable quantum cryptographyPhysical Review A, 2000
- Quantum cryptography with squeezed statesPhysical Review A, 2000