On the Security of Linear Sketch Schemes against Recovering Attacks

Takahiro Matsuda, Kenta Takahashi, Goichiro Hanaoka

2018

Abstract

Recently, the notion of fuzzy signature was introduced by Takahashi et al. (ACNS 2015, ACNS 2016, ePrint 2017). It is a signature scheme in which signatures can be generated using “fuzzy data” (i.e. noisy data such as biometric features) as a signing key, without using any additional user-specific data (such as a helper string in the context of fuzzy extractors). One of the main building blocks in the existing fuzzy signature schemes, is a primitive called linear sketch, which can be interpreted as a certain form of (one-way) encoding with which fuzzy data is encoded, and is used in combination with an ordinary signature scheme with certain functional and security properties, to construct a fuzzy signature scheme. Although the security of the underlying linear sketch scheme is very important for the security of the constructed fuzzy signature schemes, a linear sketch scheme is a relatively new primitive, and what security properties its definition and the existing constructions satisfy, has not been understood well. In order to deepen our understanding of this primitive, in this paper we clarify the security properties achieved by the existing linear sketch schemes. More specifically, we formalize security of a linear sketch scheme against “recovering” attacks, and then clarify that the existing linear sketch schemes achieve sufficiently strong security against them.

Download


Paper Citation


in Harvard Style

Matsuda T., Takahashi K. and Hanaoka G. (2018). On the Security of Linear Sketch Schemes against Recovering Attacks.In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 1: SECRYPT, ISBN 978-989-758-319-3, pages 76-87. DOI: 10.5220/0006847100760087


in Bibtex Style

@conference{secrypt18,
author={Takahiro Matsuda and Kenta Takahashi and Goichiro Hanaoka},
title={On the Security of Linear Sketch Schemes against Recovering Attacks},
booktitle={Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 1: SECRYPT,},
year={2018},
pages={76-87},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006847100760087},
isbn={978-989-758-319-3},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 1: SECRYPT,
TI - On the Security of Linear Sketch Schemes against Recovering Attacks
SN - 978-989-758-319-3
AU - Matsuda T.
AU - Takahashi K.
AU - Hanaoka G.
PY - 2018
SP - 76
EP - 87
DO - 10.5220/0006847100760087