RISC Seminars (Research on Information Security and Cryptology)

     Archives: [2024] [2023] [2022] [2021] [2020] [2019] [2018] [2017] [2016] [2015] [2014] [2013] [2012] [2011] [2010] [2009] [2008] [2007] [2006] [2005] [2004] [List of Speakers]
(To receive information about upcoming seminars, register for the RISC mailing list.)
[print]
RISC Seminar
Date:October 12
Location:CWI, Room Z009
Schedule: 
13:00-14:00Yevgeniy Dodis (New York University):
Basing Cryptography on Biometrics and Other Noisy Data
Abstract: We provide formal definitions and efficient secure techniques for
  • turning biometric information into keys usable for any cryptographic application, and
  • reliably and securely authenticating biometric data.
Our techniques apply not just to biometric information, but to any keying material that, unlike traditional cryptographic keys, is (1) not reproducible precisely and (2) not distributed uniformly. We propose two new primitives. A *fuzzy extractor* extracts nearly uniform randomness R from its biometric input; the extraction is error-tolerant in the sense that R will be the same even if the input changes, as long as it remains reasonably close to the original. Thus, R can be used as a key in any cryptographic application. A *secure sketch* produces public information about its biometric input w that does not reveal w, and yet allows exact recovery of w given another value that is close to w. Thus, it can be used to reliably reproduce error-prone biometric inputs without incurring the security risk inherent in storing them.
In addition to formally introducing our new primitives, we provide nearly optimal constructions of both primitives for various measures of "closeness" of input data, such as Hamming distance, edit metric, permutation distance and set difference.
If time permits, some follow-up work will be mentioned. The talk will be introductory and self-contained. Original paper can be found at http://eprint.iacr.org/2003/235
14:00-15:00Moti Yung (Columbia University):
SZK Proofs for Generalized Discrete-Log Relation Sets and Applications
Abstract: We present a generic SZK protocol for proving knowledge of a witness to generalized discrete-log relations. This gives a framework that allows such proofs of relations over mixed sets of groups of unknown (and known) orders. The tool allows automatic construction of SZK proofs from descriptions of groups, variable constraints and relations.
This primitive generalizes many previous instantiations that have appeared in the literature as ad-hoc SZK proofs (some of which had subtle mistakes in them (originally), and some are overly complex). The protocol is a powerful tool for building various cryptographic mechanisms. We demonstrate its power by presenting two new and efficient verifiable encryption protocols: one for full-domain hash RSA signatures, and one for the recent CL signatures.
0.01159s c