Apress

Security with Noisy Data

On Private Biometrics, Secure Key Storage and Anti-Counterfeiting

By Pim Tuyls , Boris Škoric , Tom Kevenaar

Security with Noisy Data Cover Image

  • ISBN13: 978-1-8462-8983-5
  • 356 Pages
  • User Level: Science
  • Publication Date: October 24, 2007
  • Available eBook Formats: PDF
  • eBook Price: $119.00
Buy eBook Buy Print Book Add to Wishlist
Full Description
Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data. It covers both the theory of authentication based on noisy data and shows it in practice as a key tool for prevention of counterfeiting. Biometrics and physical unclonable functions are discussed extensively. Key new technologies discussed include: -Algorithms to derive secure keys form noisy data in particular from Physical Unclonable Functions and Biometrics, - also the theory which proves that those algorithms are secure is made accessible; Practical Implementations of the above mentioned algorithms; - Techniques that give insight in the security of those systems in practice; An overview and detailed description of new applications that become possible by using these new algorithms. This book can serve as a starting point for PhD students entering the field and will also benefit professionals.
Table of Contents

Table of Contents

  1. Preface (Bart Preneel).
  2. Introduction.
  3. Part I: Theory of Security with Noisy Data.
  4. Unbreakable Keys from Random Noise.
  5. Fuzzy Commitment.
  6. A Communication
  7. Theretical View on Secret Extraction.
  8. Fuzzy Extractors.
  9. Robust and Reuseable Fuzzy Extractors.
  10. Fuzzy Identities and Attribute
  11. Based Encryption.
  12. Unconditionally Secure Multi
  13. Party Computation from Noisy Resources.
  14. Computationally Secure Authentication with Noisy Data.
  15. Part II: Applications of Security with Noisy Data.
  16. Privacy enhancements for Inexact Biometric Templates.
  17. Protection of Biometric Information.
  18. On the Amount of Entropy in PUFs.
  19. Entropy Estimation for Optical PUFs Based on Context
  20. Tree Weighting Methods.
  21. Controlled Physical Random Functions.
  22. Experimental Hardware for Coating PUFs and Optical PUFs.
  23. Secure Key Storage with PUFs.
  24. Anti
  25. Counterfeiting.
  26. References.
  27. Index.
Errata

If you think that you've found an error in this book, please let us know about it. You will find any confirmed erratum below, so you can check if your concern has already been addressed.

* Required Fields

No errata are currently published