Security with Noisy Data On Private Biometrics, Secure Key Storage and Anti-Counterfeiting

Noisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human beings, or physical structures, such as physical unclonable functions. This book examines how the presence of noise has an impact on information security, describes how it can b...

Full description

Saved in:
Bibliographic Details
Main Authors Tuyls, Pim, Kevenaar, Tom, Skoric, Boris
Format eBook Book
LanguageEnglish
Published London Springer Verlag London Limited 2007
Springer
Springer London, Limited
Springer London
Edition1. Aufl.
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Noisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human beings, or physical structures, such as physical unclonable functions. This book examines how the presence of noise has an impact on information security, describes how it can be dealt with and possibly used to generate an advantage over traditional approaches, and provides a self-contained overview of the techniques and applications of security based on noisy data. Security with Noisy Data thoroughly covers the theory of authentication based on noisy data and shows it in practice as a key tool for preventing counterfeiting. Part I discusses security primitives that allow noisy inputs, and Part II focuses on the practical applications of the methods discussed in the first part. Key features: - Contains algorithms to derive secure keys from noisy data, in particular from physical unclonable functions and biometrics - as well as the theory proving that those algorithms are secure - Offers practical implementations of algorithms, including techniques that give insight into system security - Includes an overview and detailed description of new applications made possible by using these new algorithms - Discusses recent theoretical as well as application-oriented developments in the field, combining noisy data with cryptography - Describes the foundations of the subject in a clear, accessible and reader-friendly style - Presents the principles of key establishment and multiparty computation over noisy channels - Provides a detailed overview of the building blocks of cryptography for noisy data and explains how these techniques can be applied, (for example as anti-counterfeiting and key storage) - Introduces privacy protected biometric systems, analyzes the theoretical and practical properties of PUFs and discusses PUF based systems - Addresses biometrics and physical unclonable functions extensively This comprehensive introduction offers an excellent foundation to graduate students and researchers entering the field, and will also benefit professionals needing to expand their knowledge. Readers will gain a well-rounded and broad understanding of the topic through the insight it provides into both theory and practice. Pim Tuyls is a Principal Scientist at Philips Research and a Visiting Professor at the COSIC Department of the Katholieke Universiteit of Leuven, Dr Boris Skoric and Dr Tom Kevenaar are research scientists at Philips Research Laboratories, Eindhoven.
AbstractList Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data. It provides a comprehensive overview of the theory of extracting cryptographic keys from noisy data, and describes applications in the field of biometrics, secure key storage, and anti-counterfeiting.
Noisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human beings, or physical structures, such as physical unclonable functions. This book examines how the presence of noise has an impact on information security, describes how it can be dealt with and possibly used to generate an advantage over traditional approaches, and provides a self-contained overview of the techniques and applications of security based on noisy data. Security with Noisy Data thoroughly covers the theory of authentication based on noisy data and shows it in practice as a key tool for preventing counterfeiting. Part I discusses security primitives that allow noisy inputs, and Part II focuses on the practical applications of the methods discussed in the first part. Key features: - Contains algorithms to derive secure keys from noisy data, in particular from physical unclonable functions and biometrics - as well as the theory proving that those algorithms are secure - Offers practical implementations of algorithms, including techniques that give insight into system security - Includes an overview and detailed description of new applications made possible by using these new algorithms - Discusses recent theoretical as well as application-oriented developments in the field, combining noisy data with cryptography - Describes the foundations of the subject in a clear, accessible and reader-friendly style - Presents the principles of key establishment and multiparty computation over noisy channels - Provides a detailed overview of the building blocks of cryptography for noisy data and explains how these techniques can be applied, (for example as anti-counterfeiting and key storage) - Introduces privacy protected biometric systems, analyzes the theoretical and practical properties of PUFs and discusses PUF based systems - Addresses biometrics and physical unclonable functions extensively This comprehensive introduction offers an excellent foundation to graduate students and researchers entering the field, and will also benefit professionals needing to expand their knowledge. Readers will gain a well-rounded and broad understanding of the topic through the insight it provides into both theory and practice. Pim Tuyls is a Principal Scientist at Philips Research and a Visiting Professor at the COSIC Department of the Katholieke Universiteit of Leuven, Dr Boris Skoric and Dr Tom Kevenaar are research scientists at Philips Research Laboratories, Eindhoven.
Author Skoric, Boris
Tuyls, Pim
Kevenaar, Tom
Author_xml – sequence: 1
  fullname: Tuyls, Pim
– sequence: 2
  fullname: Kevenaar, Tom
– sequence: 3
  fullname: Skoric, Boris
BackLink https://cir.nii.ac.jp/crid/1130282272873006464$$DView record in CiNii
BookMark eNpF0FtLwzAUB_CIF9zm3vVtiAg-1CUnaS6POucFhj4o4ltI09TV1XY2nWPf3nQVDSThD79zyEkf7ZVV6RA6IfiSYCzGSsiIRJJxkJGSLIId1CfbGNLb7n-g5AD1ACslBWHyEA29_8BhAaOgoIeOn51d1XmzGa3zZj56rHK_Gd2Yxhyh_cwU3g1_7wF6vZ2-TO6j2dPdw-RqFhmqYkWjsDPJWJJyoJk1JqEJEc7yNItBcEJtnKXG8UwEQpxKXcwh4YmgnFvpDKcDdNE1Nn7h1n5eFY3X34VLqmrhdRj0by4IdtxZv6zz8t3VulME6_ZbWq2J3nodCnRbcd5VLOvqa-V8o7eNrSub2hR6ej2hVDBGAjzrYJnn2ubtSQjFIAEESEEx5oyzwE47ZnNTppUO7_g09UZ3EWKIJaU_SSB1HQ
ContentType eBook
Book
Copyright Springer-Verlag London 2007
Copyright_xml – notice: Springer-Verlag London 2007
DBID 08O
RYH
DEWEY 005.82
DOI 10.1007/978-1-84628-984-2
DatabaseName ciando eBooks
CiNii Complete
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Biology
Computer Science
Mathematics
EISBN 184628984X
9781846289842
Edition 1. Aufl.
1
Editor Skoric, Boris
Tuyls, Pim
Kevenaar, Tom
Editor_xml – sequence: 1
  givenname: Pim
  surname: Tuyls
  fullname: Tuyls, Pim
  email: pim.tuyls@philips.com
  organization: Philips Research, Netherlands
– sequence: 2
  givenname: Boris
  surname: Skoric
  fullname: Skoric, Boris
  email: boris.skoric@philips.com
  organization: Philips Research, Netherlands
– sequence: 3
  givenname: Tom
  surname: Kevenaar
  fullname: Kevenaar, Tom
  email: tom.kevenaar@philips.com
  organization: Philips Research, Netherlands
ExternalDocumentID 9781846289842
133896
EBC337441
BA8506448X
ciando252583
GroupedDBID -7M
-7P
-BG
-T.
08O
0D6
0DA
0E8
20A
38.
A4I
AABBV
AABFA
AAHDE
AAUKK
ABMNI
ACAMX
ACBPT
ACFGI
ADQVG
ADVHH
AEJLV
AEKFX
AETDV
AEVYL
AEZAY
AGNDD
AHMWK
ALMA_UNASSIGNED_HOLDINGS
AZZ
BBABE
CZZ
E6I
IEZ
JJU
LZA
MYL
NUC
NUP
SAO
SBO
TPJZQ
Z7R
Z7X
Z7Z
Z81
Z83
Z84
Z88
Z8R
Z8W
Z92
AAJYQ
AATVQ
ABBUY
ABCYT
ACDTA
ACDUY
AEHEY
AHNNE
ATJMZ
RYH
Z7U
ID FETCH-LOGICAL-a39593-593f844bd623fcaab3b17ec6df527613c5fdae6f74bd1e9de562b6b7366c8ea63
ISBN 1846289831
9781846289835
IngestDate Wed May 21 12:58:01 EDT 2025
Tue Jul 29 20:13:16 EDT 2025
Fri May 30 21:22:28 EDT 2025
Thu Jun 26 23:43:20 EDT 2025
Tue Jul 23 04:36:27 EDT 2024
IsPeerReviewed false
IsScholarly false
Keywords Computer Informatik
LCCallNum_Ident QA268
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-a39593-593f844bd623fcaab3b17ec6df527613c5fdae6f74bd1e9de562b6b7366c8ea63
Notes Includes bibliographical references and index
OCLC 209987148
PQID EBC337441
PageCount 348
ParticipantIDs askewsholts_vlebooks_9781846289842
springer_books_10_1007_978_1_84628_984_2
proquest_ebookcentral_EBC337441
nii_cinii_1130282272873006464
ciando_primary_ciando252583
PublicationCentury 2000
PublicationDate 2007
c2007
2007-10-15
PublicationDateYYYYMMDD 2007-01-01
2007-10-15
PublicationDate_xml – year: 2007
  text: 2007
PublicationDecade 2000
PublicationPlace London
PublicationPlace_xml – name: London
PublicationYear 2007
Publisher Springer Verlag London Limited
Springer
Springer London, Limited
Springer London
Publisher_xml – name: Springer Verlag London Limited
– name: Springer
– name: Springer London, Limited
– name: Springer London
SSID ssj0000243292
Score 2.232728
Snippet Noisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human beings, or physical structures, such...
Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the...
SourceID askewsholts
springer
proquest
nii
ciando
SourceType Aggregation Database
Publisher
SubjectTerms Algorithm Analysis and Problem Complexity
Biometrics
Computer Science
Cryptology
Data encryption (Computer science)
Data Structures and Information Theory
Electronic noise
Subtitle On Private Biometrics, Secure Key Storage and Anti-Counterfeiting
Title Security with Noisy Data
URI http://ebooks.ciando.com/book/index.cfm/bok_id/252583
https://cir.nii.ac.jp/crid/1130282272873006464
https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=337441
http://link.springer.com/10.1007/978-1-84628-984-2
https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781846289842&uid=none
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3_i9MwFA_eRHC_qFOxnqdBPBBmj6Ztks7fdmNyHOpP89gPQmjaFMqdraxVmH-9L1_abvNA9IeFJXRN2s9b8l7y3uch9CYqUhpIyn2WhRIMlCz2wQzK_SCXEci0IonU8c6fPrOLL_Hlmq6HjKcmuqSVZ9mvW-NK_gdVaANcdZTsPyDb3xQa4DvgCyUgDOWB8ttXXfyGyzpnt1Grumy2U-3raVkhtNeVTlqmpia4XnPwG7Qa_Ss1hb_tVPtEam8dS9Xalr7JGaE2hSrbbjEzXhfbG8vkX37r2k4X9HQeXNeb0iii3EgI1IZTIU0KlVrH7ZV96n5fgR_sK3T7inv2JpiDDCy0xDKM_DH7Dg4XxDdX-rMkdtGN-6TW53PDlBcn6yN0xDlMR3fny8uPV_32mCZKDGehDfq3fRLH0NWPoTukdjzBe32O0ThtrmGdgDWkbUC90HtEeQ0aRFWWe9bEwQG40StWD9FIx5o8QndUNUH3bF7Q7QQ96HJtYDf1TtB4hzjyMfraCQDWAoCNAGAtAPg9rivs4McD_O-wBR8D-NiBj2Go-Bbwn6CrD8vV4sJ3eTL8NNK80j58iiSOZQ66bJGlqYwk4SpjeUFDDvpaRos8VazgcAlRs1yB0iuZ5BFjWaJSFj1Fo6qu1DOEA6KKgGU0ycGOjjmToeKSEJbSjEhJZh56vfNexc8bc6bfiB1g4tBDx_Z1i--WMkXYakhDmkQeOgEMoEmXRB-cg5LKwXKPtH7MYg-96tAR5u7OTVkszxdRxEF_99DbDjRhu-_It2EYgggzEAEjEeHzv3R2jO4Pwv8CjdrND3UCamYrXzqR_A2mzXFG
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Security+with+noisy+data+%3A+on+private+biometrics%2C+secure+key+storage+and+anti-counterfeiting&rft.au=Tuyls%2C+Pim&rft.au=%C5%A0kori%C4%87%2C+Boris&rft.au=Kevenaar%2C+Tom&rft.date=2007-01-01&rft.pub=Springer&rft.isbn=9781846289835&rft_id=info:doi/10.1007%2F978-1-84628-984-2&rft.externalDocID=BA8506448X
thumbnail_m http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97818462%2F9781846289842.jpg
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fmedia.springernature.com%2Fw306%2Fspringer-static%2Fcover-hires%2Fbook%2F978-1-84628-984-2