A Fuzzy Vault Scheme View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2006-02

AUTHORS

Ari Juels, Madhu Sudan

ABSTRACT

We describe a simple and novel cryptographic construction that we refer to as a fuzzy vault. A player Alice may place a secret value κ in a fuzzy vault and “lock” it using a set A of elements from some public universe U. If Bob tries to “unlock” the vault using a set B of similar length, he obtains κ only if B is close to A, i.e., only if A and B overlap substantially. In constrast to previous constructions of this flavor, ours possesses the useful feature of order invariance, meaning that the ordering of A and B is immaterial to the functioning of the vault. As we show, our scheme enjoys provable security against a computationally unbounded attacker. Fuzzy vaults have potential application to the problem of protecting data in a number of real-world, error-prone environments. These include systems in which personal information serves to authenticate users for, e.g., the purposes of password recovery, and also to biometric authentication systems, in which readings are inherently noisy as a result of the refractory nature of image capture and processing. More... »

PAGES

237-257

References to SciGraph publications

  • 2000-05-12. Noisy Polynomial Interpolation and Noisy Chinese Remaindering in ADVANCES IN CRYPTOLOGY — EUROCRYPT 2000
  • 1997. Efficient Cryptographic Protocols Based on Noisy Channels in ADVANCES IN CRYPTOLOGY — EUROCRYPT ’97
  • 1992-01. Experimental quantum cryptography in JOURNAL OF CRYPTOLOGY
  • 2000-05-12. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman in ADVANCES IN CRYPTOLOGY — EUROCRYPT 2000
  • Journal

    TITLE

    Designs, Codes and Cryptography

    ISSUE

    2

    VOLUME

    38

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s10623-005-6343-z

    DOI

    http://dx.doi.org/10.1007/s10623-005-6343-z

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1033876746


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Artificial Intelligence and Image Processing", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "RSA Laboratories, 174 Middlesex Turnpike, 01730, Bedford, MA, USA", 
              "id": "http://www.grid.ac/institutes/None", 
              "name": [
                "RSA Laboratories, 174 Middlesex Turnpike, 01730, Bedford, MA, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Juels", 
            "givenName": "Ari", 
            "id": "sg:person.0743264341.01", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0743264341.01"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Massachusetts Institute of Technology, 32 Vassar street, 02139, Cambridge, MA, USA", 
              "id": "http://www.grid.ac/institutes/grid.116068.8", 
              "name": [
                "Massachusetts Institute of Technology, 32 Vassar street, 02139, Cambridge, MA, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Sudan", 
            "givenName": "Madhu", 
            "id": "sg:person.014663420265.17", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014663420265.17"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/3-540-45539-6_4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1052893403", 
              "https://doi.org/10.1007/3-540-45539-6_4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-69053-0_21", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1016385554", 
              "https://doi.org/10.1007/3-540-69053-0_21"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bf00191318", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1000187285", 
              "https://doi.org/10.1007/bf00191318"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45539-6_12", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1011394118", 
              "https://doi.org/10.1007/3-540-45539-6_12"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2006-02", 
        "datePublishedReg": "2006-02-01", 
        "description": "We describe a simple and novel cryptographic construction that we refer to as a fuzzy vault. A player Alice may place a secret value \u03ba in a fuzzy vault and \u201clock\u201d it using a set A of elements from some public universe U. If Bob tries to \u201cunlock\u201d the vault using a set B of similar length, he obtains \u03ba only if B is close to A, i.e., only if A and B overlap substantially. In constrast to previous constructions of this flavor, ours possesses the useful feature of order invariance, meaning that the ordering of A and B is immaterial to the functioning of the vault. As we show, our scheme enjoys provable security against a computationally unbounded attacker. Fuzzy vaults have potential application to the problem of protecting data in a number of real-world, error-prone environments. These include systems in which personal information serves to authenticate users for, e.g., the purposes of password recovery, and also to biometric authentication systems, in which readings are inherently noisy as a result of the refractory nature of image capture and processing.", 
        "genre": "article", 
        "id": "sg:pub.10.1007/s10623-005-6343-z", 
        "inLanguage": "en", 
        "isAccessibleForFree": false, 
        "isPartOf": [
          {
            "id": "sg:journal.1136552", 
            "issn": [
              "0925-1022", 
              "1573-7586"
            ], 
            "name": "Designs, Codes and Cryptography", 
            "publisher": "Springer Nature", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "2", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "38"
          }
        ], 
        "keywords": [
          "fuzzy vault", 
          "error-prone environment", 
          "novel cryptographic construction", 
          "fuzzy vault scheme", 
          "biometric authentication system", 
          "authentication system", 
          "provable security", 
          "cryptographic constructions", 
          "password recovery", 
          "unbounded attacker", 
          "personal information", 
          "image capture", 
          "useful features", 
          "order invariance", 
          "universe U.", 
          "players Alice", 
          "previous constructions", 
          "scheme", 
          "attacker", 
          "users", 
          "security", 
          "system", 
          "processing", 
          "information", 
          "environment", 
          "Bob", 
          "Alice", 
          "applications", 
          "construction", 
          "features", 
          "value \u03ba", 
          "vault", 
          "capture", 
          "data", 
          "potential applications", 
          "number", 
          "invariance", 
          "elements", 
          "purpose", 
          "results", 
          "ordering", 
          "constrast", 
          "reading", 
          "nature", 
          "length", 
          "recovery", 
          "flavor", 
          "U.", 
          "similar length", 
          "functioning", 
          "refractory nature", 
          "problem", 
          "secret value \u03ba", 
          "public universe U.", 
          "Vault Scheme"
        ], 
        "name": "A Fuzzy Vault Scheme", 
        "pagination": "237-257", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1033876746"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s10623-005-6343-z"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s10623-005-6343-z", 
          "https://app.dimensions.ai/details/publication/pub.1033876746"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2022-01-01T18:16", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/article/article_426.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://doi.org/10.1007/s10623-005-6343-z"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s10623-005-6343-z'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s10623-005-6343-z'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s10623-005-6343-z'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s10623-005-6343-z'


     

    This table displays all metadata directly associated to this object as RDF triples.

    139 TRIPLES      22 PREDICATES      85 URIs      73 LITERALS      6 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s10623-005-6343-z schema:about anzsrc-for:08
    2 anzsrc-for:0801
    3 schema:author Nb2fcdcdd86cd45d1b82f98e13ff28396
    4 schema:citation sg:pub.10.1007/3-540-45539-6_12
    5 sg:pub.10.1007/3-540-45539-6_4
    6 sg:pub.10.1007/3-540-69053-0_21
    7 sg:pub.10.1007/bf00191318
    8 schema:datePublished 2006-02
    9 schema:datePublishedReg 2006-02-01
    10 schema:description We describe a simple and novel cryptographic construction that we refer to as a fuzzy vault. A player Alice may place a secret value κ in a fuzzy vault and “lock” it using a set A of elements from some public universe U. If Bob tries to “unlock” the vault using a set B of similar length, he obtains κ only if B is close to A, i.e., only if A and B overlap substantially. In constrast to previous constructions of this flavor, ours possesses the useful feature of order invariance, meaning that the ordering of A and B is immaterial to the functioning of the vault. As we show, our scheme enjoys provable security against a computationally unbounded attacker. Fuzzy vaults have potential application to the problem of protecting data in a number of real-world, error-prone environments. These include systems in which personal information serves to authenticate users for, e.g., the purposes of password recovery, and also to biometric authentication systems, in which readings are inherently noisy as a result of the refractory nature of image capture and processing.
    11 schema:genre article
    12 schema:inLanguage en
    13 schema:isAccessibleForFree false
    14 schema:isPartOf N063b4f9fc31a4fff8e4344fb62faf886
    15 N79f464df11864a93b61baeefcc9272fd
    16 sg:journal.1136552
    17 schema:keywords Alice
    18 Bob
    19 U.
    20 Vault Scheme
    21 applications
    22 attacker
    23 authentication system
    24 biometric authentication system
    25 capture
    26 constrast
    27 construction
    28 cryptographic constructions
    29 data
    30 elements
    31 environment
    32 error-prone environment
    33 features
    34 flavor
    35 functioning
    36 fuzzy vault
    37 fuzzy vault scheme
    38 image capture
    39 information
    40 invariance
    41 length
    42 nature
    43 novel cryptographic construction
    44 number
    45 order invariance
    46 ordering
    47 password recovery
    48 personal information
    49 players Alice
    50 potential applications
    51 previous constructions
    52 problem
    53 processing
    54 provable security
    55 public universe U.
    56 purpose
    57 reading
    58 recovery
    59 refractory nature
    60 results
    61 scheme
    62 secret value κ
    63 security
    64 similar length
    65 system
    66 unbounded attacker
    67 universe U.
    68 useful features
    69 users
    70 value κ
    71 vault
    72 schema:name A Fuzzy Vault Scheme
    73 schema:pagination 237-257
    74 schema:productId N40010c2daadb4ab4bbddc9eb505027cf
    75 N553f1b81bc7a44d4b3c3feca73a5a976
    76 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033876746
    77 https://doi.org/10.1007/s10623-005-6343-z
    78 schema:sdDatePublished 2022-01-01T18:16
    79 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    80 schema:sdPublisher N75555c4c7e2543099db222bd6755d47b
    81 schema:url https://doi.org/10.1007/s10623-005-6343-z
    82 sgo:license sg:explorer/license/
    83 sgo:sdDataset articles
    84 rdf:type schema:ScholarlyArticle
    85 N063b4f9fc31a4fff8e4344fb62faf886 schema:volumeNumber 38
    86 rdf:type schema:PublicationVolume
    87 N40010c2daadb4ab4bbddc9eb505027cf schema:name doi
    88 schema:value 10.1007/s10623-005-6343-z
    89 rdf:type schema:PropertyValue
    90 N553f1b81bc7a44d4b3c3feca73a5a976 schema:name dimensions_id
    91 schema:value pub.1033876746
    92 rdf:type schema:PropertyValue
    93 N727bac22b3a547d9ad1d977f6d58e4ec rdf:first sg:person.014663420265.17
    94 rdf:rest rdf:nil
    95 N75555c4c7e2543099db222bd6755d47b schema:name Springer Nature - SN SciGraph project
    96 rdf:type schema:Organization
    97 N79f464df11864a93b61baeefcc9272fd schema:issueNumber 2
    98 rdf:type schema:PublicationIssue
    99 Nb2fcdcdd86cd45d1b82f98e13ff28396 rdf:first sg:person.0743264341.01
    100 rdf:rest N727bac22b3a547d9ad1d977f6d58e4ec
    101 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    102 schema:name Information and Computing Sciences
    103 rdf:type schema:DefinedTerm
    104 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
    105 schema:name Artificial Intelligence and Image Processing
    106 rdf:type schema:DefinedTerm
    107 sg:journal.1136552 schema:issn 0925-1022
    108 1573-7586
    109 schema:name Designs, Codes and Cryptography
    110 schema:publisher Springer Nature
    111 rdf:type schema:Periodical
    112 sg:person.014663420265.17 schema:affiliation grid-institutes:grid.116068.8
    113 schema:familyName Sudan
    114 schema:givenName Madhu
    115 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014663420265.17
    116 rdf:type schema:Person
    117 sg:person.0743264341.01 schema:affiliation grid-institutes:None
    118 schema:familyName Juels
    119 schema:givenName Ari
    120 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0743264341.01
    121 rdf:type schema:Person
    122 sg:pub.10.1007/3-540-45539-6_12 schema:sameAs https://app.dimensions.ai/details/publication/pub.1011394118
    123 https://doi.org/10.1007/3-540-45539-6_12
    124 rdf:type schema:CreativeWork
    125 sg:pub.10.1007/3-540-45539-6_4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052893403
    126 https://doi.org/10.1007/3-540-45539-6_4
    127 rdf:type schema:CreativeWork
    128 sg:pub.10.1007/3-540-69053-0_21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1016385554
    129 https://doi.org/10.1007/3-540-69053-0_21
    130 rdf:type schema:CreativeWork
    131 sg:pub.10.1007/bf00191318 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000187285
    132 https://doi.org/10.1007/bf00191318
    133 rdf:type schema:CreativeWork
    134 grid-institutes:None schema:alternateName RSA Laboratories, 174 Middlesex Turnpike, 01730, Bedford, MA, USA
    135 schema:name RSA Laboratories, 174 Middlesex Turnpike, 01730, Bedford, MA, USA
    136 rdf:type schema:Organization
    137 grid-institutes:grid.116068.8 schema:alternateName Massachusetts Institute of Technology, 32 Vassar street, 02139, Cambridge, MA, USA
    138 schema:name Massachusetts Institute of Technology, 32 Vassar street, 02139, Cambridge, MA, USA
    139 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...