Robust Fuzzy Extractors and Authenticated Key Agreement From Close Secrets. Dodis, Y., Kanukurthi, B., Katz, J., Reyzin, L., & Smith, A. IEEE Transactions on Information Theory, 58(9):6207–6222, September, 2012.
doi  abstract   bibtex   
Consider two parties holding samples from correlated distributions $^{\textrm{prime\$$, respectively, where these samples are within distance \$t\$ of each other in some metric space. The parties wish to agree on a close-to-uniformly distributed secret key \$R\$ by sending a single message over an insecure channel controlled by an all-powerful adversary who may read and modify anything sent over the channel. We consider both the keyless case, where the parties share no additional secret information, and the keyed case, where the parties share a long-term secret \$ssr SK_ssr Ext\$ that they can use to generate a sequence of session keys \$R_j\$ using multiple pairs \$(W_j, W\textasciicircumprime_j)\$. The former has applications to, e.g., biometric authentication, while the latter arises in, e.g., the bounded-storage model with errors. We show solutions that improve upon previous work in several respects. The best prior solution for the keyless case with no errors (i.e., \$t=0\$) requires the min-entropy of \$W\$ to exceed \$2n/3\$ , where \$n\$ is the bit length of \$W\$ . Our solution applies whenever the mi- -entropy of \$W\$ exceeds the minimal threshold \$n/2\$, and yields a longer key.
@article{dodis_robust_2012,
	title = {Robust {Fuzzy} {Extractors} and {Authenticated} {Key} {Agreement} {From} {Close} {Secrets}},
	volume = {58},
	issn = {0018-9448},
	doi = {10.1109/TIT.2012.2200290},
	abstract = {Consider two parties holding samples from correlated distributions $^{\textrm{prime\$}}$, respectively, where these samples are within distance \$t\$ of each other in some metric space. The parties wish to agree on a close-to-uniformly distributed secret key \$R\$ by sending a single message over an insecure channel controlled by an all-powerful adversary who may read and modify anything sent over the channel. We consider both the keyless case, where the parties share no additional secret information, and the keyed case, where the parties share a long-term secret \$ssr SK\_ssr Ext\$ that they can use to generate a sequence of session keys \$R\_j\$ using multiple pairs \$(W\_j, W{\textasciicircum}prime\_j)\$. The former has applications to, e.g., biometric authentication, while the latter arises in, e.g., the bounded-storage model with errors. We show solutions that improve upon previous work in several respects. The best prior solution for the keyless case with no errors (i.e., \$t=0\$) requires the min-entropy of \$W\$ to exceed \$2n/3\$ , where \$n\$ is the bit length of \$W\$ . Our solution applies whenever the mi- -entropy of \$W\$ exceeds the minimal threshold \$n/2\$, and yields a longer key.},
	number = {9},
	journal = {IEEE Transactions on Information Theory},
	author = {Dodis, Y. and Kanukurthi, B. and Katz, J. and Reyzin, L. and Smith, A.},
	month = sep,
	year = {2012},
	pages = {6207--6222}
}

Downloads: 0