Collaborative Research: Rigorous Cryptography from Biometrics and Other Noisy Data
合作研究:来自生物识别和其他噪音数据的严格密码学
基本信息
- 批准号:0515121
- 负责人:
- 金额:$ 10万
- 依托单位:
- 依托单位国家:美国
- 项目类别:Standard Grant
- 财政年份:2005
- 资助国家:美国
- 起止时间:2005-07-01 至 2009-06-30
- 项目状态:已结题
- 来源:
- 关键词:
项目摘要
Sources of entropy that are not precisely reproducible nor uniformly distributed, such as biometrics, nontraditional passwords, or physical random functions, are increasingly suggested as tools in electronic and physical security. There are, however, many significant unresolved questions about exactly how such sources should be used and stored. This proposal focuses on investigating how to use them securely, reliably, privately and versatilely. The techniques studied will have applications well beyond biometric authentication, to settings where noisy data needs to be stored securely, compared privately, or used cryptographically.A simple motivating scenario for our research is that of password-based authentication. In order to avoid security vulnerabilities inherent in storing passwords, systems often store their one-way hashes instead. When a user's password is entered for verification, it is first hashed and then compared to the stored hash value. The problem with passwords, of course, is that their entropy is low. The problem with using highentropy inputs, on the other hand, is that the readily available ones are hard to reproduce precisely: humans make typographical errors in long passphrases and forget some of the answers to multiple questions, while machines cannot precisely reproduce fingerprints and iris scans from one reading to the next. Therefore, the one-way hash function approach does not work, because even slight variations in the input will results in drastic changes of the hash value. Without additional techniques, one has no choice but to store the originalenrollment value and accept the inherent security vulnerabilities, or to exhaustively search all values close to the input value.Intellectual Merits of the Proposed ProjectThe proposed research will allow verification of such noisy high-entropy inputs without requiring secret storage or performing brute-force search. What distinguishes our work from related prior work in the literature is that our approach is rigorous and versatile. The techniques we propose to study will allow the use of unreliable nonuniform inputs not only in the above password-authentication scenario, but also for keys is any cryptographic application. Moreover, the same techniques will have other applications, such as privacy-preserving data mining.Our proposal builds on the recent work of the two PIs [42]. That work introduced new notions for using nonuniform and unreliable data cryptographically: secure sketches and fuzzy extractors. While the notions are already finding applications [40, 39], much work is needed to obtain and analyze practical constructions for a variety of input classes, to strengthen definitions, and to study specific new applications.Broader Impacts of the Proposed ProjectON SECURE SYSTEMS. By removing the need for large-volume distributed secure storage, our work has the potential to significantly lower the costs and potential liabilities of systems that utilize biometric or other sensitive inputs for security (as detailed in the proposal description). Moreover, it may enable systems that have relied on low-entropy passwords to switch to more secure approaches, such as biometric-based key agreement.ON PRIVACY. A significant drawback of many systems that require authentication is the loss of privacy that users experience (e.g., when having their social security numbers stored as passwords for their credit card accounts, or when having their fingerprints stored as passwords for secure doors). This work will remove the need to store private data in many applications. Moreover, as further detailed in the proposal description, the privacy protection will extend not only to the biometric (or similar) password, but also to the data protected by it, ensuring that no one without the right password will have access to the data.ON EDUCATION. The two PIs regularly teach courses on cryptography and network security, and will be able incorporate the new results into the courses they teach. In addition, the proposal has a significant graduate student training component.
熵的来源不是精确可复制的,也不是均匀分布的,如生物识别、非传统密码或物理随机函数,越来越多地被建议作为电子和物理安全的工具。然而,关于如何使用和储存这些资源,仍有许多重大的未解决的问题。本提案的重点是研究如何安全、可靠、私密和通用地使用它们。所研究的技术将远远超出生物识别认证的应用范围,应用于需要安全存储、私下比较或加密使用噪声数据的设置。我们研究的一个简单的激励场景是基于密码的身份验证。为了避免存储密码时固有的安全漏洞,系统通常会存储它们的单向散列。当输入用户密码进行验证时,首先对其进行散列,然后与存储的散列值进行比较。当然,密码的问题在于它们的熵很低。另一方面,使用高熵输入的问题在于,容易获得的输入很难精确重现:人类在长密码短语中会出现打字错误,在回答多个问题时也会忘记一些答案,而机器无法精确地再现指纹和虹膜扫描结果。因此,单向哈希函数方法不起作用,因为即使输入的微小变化也会导致哈希值的剧烈变化。如果没有额外的技术,就别无选择,只能存储原始注册值并接受固有的安全漏洞,或者彻底搜索接近输入值的所有值。拟议项目的知识价值拟议的研究将允许验证这种嘈杂的高熵输入,而不需要秘密存储或执行暴力搜索。我们的工作与文献中相关的先前工作的区别在于我们的方法是严格和通用的。我们建议研究的技术不仅允许在上述密码认证场景中使用不可靠的非均匀输入,而且还允许在任何加密应用程序中使用密钥。此外,同样的技术还会有其他应用,比如保护隐私的数据挖掘。我们的建议建立在两个pi最近的工作基础之上。这项工作引入了使用非统一和不可靠数据加密的新概念:安全草图和模糊提取器。虽然这些概念已经找到了应用[40,39],但还需要做很多工作来获取和分析各种输入类的实际结构,加强定义,并研究具体的新应用。建议项目对安全系统的更广泛影响。通过消除对大容量分布式安全存储的需求,我们的工作有可能显著降低利用生物识别或其他敏感输入来保证安全性的系统的成本和潜在责任(如提案描述中所述)。此外,它可能使依赖低熵密码的系统转向更安全的方法,例如基于生物特征的密钥协议。在隐私。许多需要身份验证的系统的一个重大缺点是用户会失去隐私(例如,当他们的社会安全号码被存储为信用卡帐户的密码时,或者当他们的指纹被存储为安全门的密码时)。这项工作将消除在许多应用程序中存储私有数据的需要。此外,正如提案描述中进一步详述的那样,隐私保护将不仅扩展到生物识别(或类似)密码,还将扩展到受其保护的数据,确保没有正确密码的人无法访问数据。在教育上。这两位pi定期教授密码学和网络安全课程,并将能够将新的结果纳入他们所教授的课程中。此外,该提案有一个重要的研究生培训组成部分。
项目成果
期刊论文数量(0)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
数据更新时间:{{ journalArticles.updateTime }}
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
数据更新时间:{{ journalArticles.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ monograph.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ sciAawards.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ conferencePapers.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ patent.updateTime }}
Yevgeniy Dodis其他文献
Signcryption
- DOI:
10.1007/0-387-23483-7_398 - 发表时间:
2005 - 期刊:
- 影响因子:0
- 作者:
Yevgeniy Dodis - 通讯作者:
Yevgeniy Dodis
Leftover Hash Lemma, Revisited
- DOI:
- 发表时间:
2011 - 期刊:
- 影响因子:
- 作者:
Boaz Barak;Yevgeniy Dodis;Hugo Krawczyk;Olivier Pereira;Krzysztof Pietrzak;Francois-Xavier Standaert;Yu Yu; - 通讯作者:
Yevgeniy Dodis的其他文献
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
{{ truncateString('Yevgeniy Dodis', 18)}}的其他基金
Collaborative Research: SaTC: CORE: Medium: Making Crypto Too BIG To Break
合作研究:SaTC:核心:媒介:让加密货币变得太大而无法破坏
- 批准号:
2055578 - 财政年份:2021
- 资助金额:
$ 10万 - 项目类别:
Standard Grant
SaTC: CORE: Small: On the Power of Preprocessing and Non-Uniformity
SaTC:核心:小:论预处理和非均匀性的力量
- 批准号:
1815546 - 财政年份:2018
- 资助金额:
$ 10万 - 项目类别:
Standard Grant
TWC: Small: On the Design of Secure Hash Functions and Block Ciphers
TWC:小:关于安全散列函数和分组密码的设计
- 批准号:
1619158 - 财政年份:2016
- 资助金额:
$ 10万 - 项目类别:
Standard Grant
TWC: Small: On Imperfect Randomness and Leakage-Resilient Cryptography
TWC:小:关于不完美随机性和抗泄漏密码学
- 批准号:
1319051 - 财政年份:2013
- 资助金额:
$ 10万 - 项目类别:
Standard Grant
TWC: Medium: Collaborative: The Theory and Practice of Key Derivation
TWC:媒介:协作:密钥派生的理论与实践
- 批准号:
1314568 - 财政年份:2013
- 资助金额:
$ 10万 - 项目类别:
Standard Grant
TC: Medium: Collaborative Research: Random Number Generation and Use in Virtualized Environments
TC:媒介:协作研究:虚拟化环境中的随机数生成和使用
- 批准号:
1065288 - 财政年份:2011
- 资助金额:
$ 10万 - 项目类别:
Standard Grant
TC: Small: The Design of Secure Hash Functions and Block Ciphers
TC:小:安全散列函数和分组密码的设计
- 批准号:
1017471 - 财政年份:2010
- 资助金额:
$ 10万 - 项目类别:
Standard Grant
CT-ISG: On Imperfect Randomness and Exposure-Resilient Cryptography
CT-ISG:关于不完美随机性和暴露弹性密码学
- 批准号:
0831299 - 财政年份:2008
- 资助金额:
$ 10万 - 项目类别:
Standard Grant
Collaborative Research: Mitigating the Damaging Effects of Key Exposure
合作研究:减轻关键暴露的破坏性影响
- 批准号:
0311095 - 财政年份:2003
- 资助金额:
$ 10万 - 项目类别:
Continuing Grant
CAREER: Exposure-Resilient Cryptography
职业:暴露弹性密码学
- 批准号:
0133806 - 财政年份:2002
- 资助金额:
$ 10万 - 项目类别:
Continuing Grant
相似国自然基金
Research on Quantum Field Theory without a Lagrangian Description
- 批准号:24ZR1403900
- 批准年份:2024
- 资助金额:0.0 万元
- 项目类别:省市级项目
Cell Research
- 批准号:31224802
- 批准年份:2012
- 资助金额:24.0 万元
- 项目类别:专项基金项目
Cell Research
- 批准号:31024804
- 批准年份:2010
- 资助金额:24.0 万元
- 项目类别:专项基金项目
Cell Research (细胞研究)
- 批准号:30824808
- 批准年份:2008
- 资助金额:24.0 万元
- 项目类别:专项基金项目
Research on the Rapid Growth Mechanism of KDP Crystal
- 批准号:10774081
- 批准年份:2007
- 资助金额:45.0 万元
- 项目类别:面上项目
相似海外基金
Collaborative Research: FMitF: Track-1: Correctness at Both Ends: Rigorous ML Meets Efficient Sparse Implementations
协作研究:FMitF:Track-1:两端的正确性:严格的 ML 满足高效的稀疏实现
- 批准号:
2124100 - 财政年份:2021
- 资助金额:
$ 10万 - 项目类别:
Standard Grant
Collaborative Research: Moving beyond access, increasing teacher knowledge to teach rigorous equity-focused high school computing
协作研究:超越获取途径,增加教师知识,教授严格的以公平为中心的高中计算
- 批准号:
2122314 - 财政年份:2021
- 资助金额:
$ 10万 - 项目类别:
Standard Grant
Collaborative Research: FMitF: Track-1: Correctness at Both Ends: Rigorous ML Meets Efficient Sparse Implementations
协作研究:FMitF:Track-1:两端的正确性:严格的 ML 满足高效的稀疏实现
- 批准号:
2124205 - 财政年份:2021
- 资助金额:
$ 10万 - 项目类别:
Standard Grant
Collaborative Research: Moving beyond access, increasing teacher knowledge to teach rigorous equity-focused high school computing
协作研究:超越获取途径,增加教师知识,教授严格的以公平为中心的高中计算
- 批准号:
2122349 - 财政年份:2021
- 资助金额:
$ 10万 - 项目类别:
Standard Grant
Collaborative Research: SHF: Medium: Practical and Rigorous Correctness Checking and Correctness Preservation for Irregular Parallel Programs
合作研究:SHF:Medium:不规则并行程序的实用且严格的正确性检查和正确性保持
- 批准号:
1955852 - 财政年份:2020
- 资助金额:
$ 10万 - 项目类别:
Continuing Grant
Collaborative Research: SHF: Medium: Practical and Rigorous Correctness Checking and Correctness Preservation for Irregular Parallel Programs
合作研究:SHF:Medium:不规则并行程序的实用且严格的正确性检查和正确性保持
- 批准号:
1956106 - 财政年份:2020
- 资助金额:
$ 10万 - 项目类别:
Standard Grant
Collaborative Research: RI: Medium: A Rigorous, General Framework for Tractable Learning of Large-Scale DAGs from Data
协作研究:RI:Medium:从数据中轻松学习大规模 DAG 的严格通用框架
- 批准号:
1956330 - 财政年份:2020
- 资助金额:
$ 10万 - 项目类别:
Continuing Grant
Collaborative Research: SHF: Medium: Practical and Rigorous Correctness Checking and Correctness Preservation for Irregular Parallel Programs
合作研究:SHF:Medium:不规则并行程序的实用且严格的正确性检查和正确性保持
- 批准号:
1955367 - 财政年份:2020
- 资助金额:
$ 10万 - 项目类别:
Continuing Grant
Collaborative Research: CIF: Medium: Learning and Inference in High-Dimensional Models: Rigorous Analysis and Applications
合作研究:CIF:中:高维模型中的学习和推理:严谨的分析和应用
- 批准号:
1955732 - 财政年份:2020
- 资助金额:
$ 10万 - 项目类别:
Continuing Grant
Collaborative Research: CIF: Medium: Learning and Inference in High-Dimensional Models: Rigorous Analysis and Applications
合作研究:CIF:中:高维模型中的学习和推理:严谨的分析和应用
- 批准号:
1955587 - 财政年份:2020
- 资助金额:
$ 10万 - 项目类别:
Continuing Grant














{{item.name}}会员




