How to strongly link data and its medium: the paper case
- 1 January 2010
- journal article
- Published by Institution of Engineering and Technology (IET) in IET Information Security
- Vol. 4 (3), 125-136
- https://doi.org/10.1049/iet-ifs.2009.0032
Abstract
Establishing a strong link between the paper medium and the data represented on it is an interesting alternative to defeat unauthorised copy and content modification attempts. Many applications would benefit from it, such as show tickets, contracts, banknotes or medical prescripts. In this study, the authors present a low-cost solution that establishes such a link by combining digital signatures, physically unclonable functions and fuzzy extractors. The proposed protocol provides two levels of security that can be used according to the time available for verifying the signature and the trust in the paper holder. In practice, this solution uses ultra-violet fibres that are poured into the paper mixture. Fuzzy extractors are then used to build identifiers for each sheet of paper and a digital signature is applied to the combination of these identifiers and the data to be protected from copy and modification. The authors additionally provide a careful statistical analysis of the robustness and amount of randomness reached by the extractors. The authors conclude that identifiers of 72 bits can be derived, which is assumed to be sufficient for the proposed application. However, more randomness, robustness and unclonability could be obtained at the cost of a more expensive process, keeping exactly the same methodology.Keywords
This publication has 7 references indexed in Scilit:
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy DataSIAM Journal on Computing, 2008
- Security with Noisy DataPublished by Springer Science and Business Media LLC ,2007
- ‘Fingerprinting’ documents and packagingNature, 2005
- Physical One-Way FunctionsScience, 2002
- On the Security of Random SourcesLecture Notes in Computer Science, 1999
- The context-tree weighting method: extensionsIEEE Transactions on Information Theory, 1998
- The context-tree weighting method: basic propertiesIEEE Transactions on Information Theory, 1995