Abstract
Fuzzy authentication allows authentication based on the fuzzy matching of two objects, for example based on the similarity of two strings in the Hamming metric, or on the similiarity of two sets in the set difference metric. Aim of this paper is to show other models and algorithms of secure fuzzy authentication, which can be performed using the rank metric. A few schemes are presented which can then be applied in different scenarios and applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Baldi M, Bianchi M, Chiaraluce F, Rosenthal J, Schipani D (2011) On fuzzy syndrome hashing with LDPC coding. In: 4th International symposium on applied sciences in biomedical and communication technologies (ISABEL). ACM, pp 1–5
Cossidente A, Marino G, Pavese F (2016) Non-linear maximum rank distance codes. Des Codes Cryptogr 79(3):597–609
de la Cruz J, Kiermaier M, Wassermann A, Willems W (2016) Algebraic structures of MRD codes. Adv Math Commun 10:499–510
Fontein F, Marshall K, Rosenthal J, Schipani D, Trautmann A-L (2012) On burst error correction and storage security of noisy data. In: 20th International symposium on mathematical theory of networks and systems (MTNS), pp 1–7
Gabidulin EM (1985) Theory of codes with maximum rank distance. Probl Pereda Inf 21(1):3–16
Horlemann-Trautmann A, Marshall K (2017) New criteria for MRD and gabidulin codes and some rank-metric code constructions. In: Advances in mathematics of communications. arXiv:1507.08641, (to appear)
Juels A, Sudan M (2006) A fuzzy vault scheme. Des Codes Cryptogr 38(2):237–257
Juels A, Wattenberg M (1999) A fuzzy commitment scheme. In: 6th ACM conference on computer and communications security, CCS’99, pp 28–36
Kshevetskiy A, Gabidulin E (2005) The new construction of rank codes. Int Symp Inf Theory (ISIT) 2005:2105–2108
Loidreau P (2006) A Welch–Berlekamp like algorithm for decoding gabidulin codes. In: Coding and cryptography. Springer, pp 36–45
Marshall K, Schipani D, Trautmann A-L, Rosenthal J (2016) Subspace fuzzy vault. In: Physical and data-link security techniques for future communication systems. Springer, pp 163–172
Neri A, Horlemann-Trautmann A-L, Randrianarisoa T, Rosenthal J (2017) On the genericity of maximum rank distance and gabidulin codes. Designs Codes and Cryptography, pp. 1–23. doi:10.1007/s10623-017-0354-4
Richter G, Plass S (2004) Error and erasure decoding of rank-codes with a modified Berlekamp-Massey algorithm. In: ITG FACHBERICHT, pp 203–210
Roth R (1991) Maximum-rank array codes and their application to crisscross error correction. IEEE Trans Inf Theory 37(2):328–336
Schipani D, Rosenthal J (2010) Coding solutions for the secure biometric storage problem. Inf Theory Worksh (ITW) 2010:1–4
Sheekey J (2016) A new family of linear maximum rank distance codes. Adv Math Commun 10:475–488
Silva D, Kschischang F (2009) Fast encoding and decoding of Gabidulin codes. Int Symp Inf Theory (ISIT) 2009:2858–2862
Acknowledgements
The authors were supported by Swiss National Science Foundation grant n.169510.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Neri, A., Rosenthal, J., Schipani, D. (2018). Fuzzy Authentication Using Rank Distance. In: Baldi, M., Quaglia, E., Tomasin, S. (eds) Proceedings of the 2nd Workshop on Communication Security. WCS 2017. Lecture Notes in Electrical Engineering, vol 447. Springer, Cham. https://doi.org/10.1007/978-3-319-59265-7_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-59265-7_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-59264-0
Online ISBN: 978-3-319-59265-7
eBook Packages: EngineeringEngineering (R0)