Boris Škorić
TU Eindhoven
van der Meulen seminar Leuven, December 2011
Helper data schemes for privacy-preserving biometrics
1
Helper data schemes for privacy-preserving biometrics Boris kori - - PowerPoint PPT Presentation
Helper data schemes for privacy-preserving biometrics Boris kori TU Eindhoven van der Meulen seminar Leuven, December 2011 1 Outline Security with noisy data - biometrics & privacy - Physical Unclonable Functions (PUFs)
van der Meulen seminar Leuven, December 2011
1
2
3
0010110101 1110111001... 3
4
TiN TiO2
Posch 1998; Tuyls et al. 2006
Guajardo et al. Su et al. 2007
Kumar et al. 2008
Pappu 2001
5
Traditional approach:
6
Traditional approach:
6
Traditional approach:
Imagine your company needs a security label ...
6
7
[Bauder, Simmons < 1991]
8
[Bauder, Simmons < 1991]
8
Check if ci is replay Measure PUF response S’ Never use ci again Authenticated channel; MAC key Si
9
EK[Device secrets] Insecure NV-mem
crypto processor POK sensor
Integrated components
K
10
11
Juels, Wattenberg 1999 Dodis, Reyzin, Smith 2003 Linnartz, Tuyls 2003
W (helper data)
W
12
Application privacy
uniform secret? Technique
authentication by password
One-Way Function biometric authentication ∎ Secure Sketch + OWF anticounter- feiting PUF
Secure Sketch + OWF anticounter- feiting PUF
w/o MACs
with MACs
Fuzzy Extractor POK
Fuzzy Extractor
13
14
ˆ X
W
Rep
W
X’
15
ˆ X
W
Rep
W
X’
15
16
16
17
17
17
18
18
Dodis, Reyzin, Smith 2003
W
public
19
Called Universal for η = 1/ |T |
Distance of F(X,R) from uniformity, given Y and R
∆(F(X, R)Y R; UℓY R) ≤ 1 2
H2(X|Y )
20
Carter, Wegman 1979
ext(X|Y ) ≥
penalty due to uniformity requirement
21
22
23
MAC key helper data
BŠ, Tuyls 2008
24
MAC key helper data
BŠ, Tuyls 2008
24
Verbitskiy, Tuyls, Obi, Schoenmakers, BŠ 2008
25
Boyen 2005
w and h=hash(x, w)
Check h’==hash(x̂,w’)
attack
w’, h’
26
Boyen 2005
w and h=hash(x, w)
Check h’==hash(x̂,w’)
attack
w’, h’
w and m=MAC(s1,w)
attack
w’, m’ Check m’==MAC(s’1,w’) Use s2 as secret
Cramer et al. 2008
26
27
28