Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data. It provides a comprehensive overview of the theory of extracting cryptographic keys from noisy data, and describes applications in the field of biometrics, secure key storage, and anti-counterfeiting.The string w is then used to derive a secret key R (e.g., used to encrypt the local hard drive). ... and the recovery algorithm Rep may receive an input IP = P. Such situations call, essentially, for authentication based on noisy secrets W a W. The anbsp;...
|Title||:||Security with Noisy Data|
|Author||:||Pim Tuyls, Boris Škoric, Tom Kevenaar|
|Publisher||:||Springer Science & Business Media - 2007-10-24|