contrast, the latter allows for an individual level of
error-tolerance for each user.
In this paper we focus on extending the work in
(Monrose et al., 2002). In particular, we introduce
a formal definition of the notion of secret locking
which generalizes the concept proposed previously.
We furthermore provide an extended discussion on
the determinant-based scheme. We give details on an
optimized implementation of the scheme which show
that its performance allows the system for use in prac-
tice. In addition, we introduce an extended framework
to analyze the security of the scheme. In the original
work, the security of the determinant-based construc-
tion was proved under an idealized attack model only.
In this paper we consider arbitrary attacks. Finally,
we discuss heuristic connections between the security
of the scheme and well-known hard problems in com-
putational mathematics and coding theory.
1.1 Motivation
Using biometrics in practice poses a number of chal-
lenges, in particular when used in applications to pro-
tect resource limited devices such as cell phones or
PDAs. Ideally, these devices should obtain biometric
measurements without requiring any additional ded-
icated hardware. Currently, most portable devices
have built-in microphones, keyboards or writing pads.
As such, systems using biometrics such as voice pat-
terns, keystroke dynamics or stylus drawing patterns
are more readily deployable than systems based on
iris or retina scans. Furthermore, it should be diffi-
cult for an adversary to capture the user’s biometric
measurements, and in particular this counter-indicates
fingerprint scans as a biometric in this regard, as fin-
gerprint marks are quite easy to obtain.
Static vs. Non-static Biometrics. While static bio-
metrics capture physiological characteristics of an in-
dividual (e.g., iris or retina patterns, and fingerprints),
non-static biometrics (e.g., voice patterns, keystroke
dynamics) relate to behavioral characteristics. In gen-
eral, it is harder for an attacker to capture non-static
than static biometrics, so they could prove useful for
the type of application we consider. However, non-
static biometrics have a high variability of robust-
ness from user to user: Some users have more reli-
ably reproducible feature readings than others. Con-
sequently, less error-tolerance is required to support
identification of users with more reliably reproducible
feature readings (Doddington et al., 1998).
Biometric Key Encapsulation requires the exact
reconstruction of the underlying key, and some form
of error-tolerance must therefore be employed in or-
der to accommodate the variability in biometric read-
ings. In order for a system to accommodate different
levels of error-tolerance allowed to identify particu-
lar users, ideally it should allow for variable error-
tolerance. Alternatively, the system-wide level could
be adjusted to the worst case, i.e., the least robust
user. In (Juels and Wattenberg, 1999; Juels and Su-
dan, 2002; Dodis et al., 2004; Boyen, 2004) error-
tolerance is achieved by means of error-correcting
codes and randomness extraction. In practice, this so-
lution either requires uniformity, with the same error-
correcting code employed for all users, or the codes
need to be defined on a user-by-user basis. While the
former solution suffers from the problem that the se-
curity of the system is reduced to the level of the least
robust user, the latter reveals to an attacker the code
used (and therefore the level of error-tolerance sup-
ported) upon inspection.
In contrast, the system introduced by Monrose et
al. allows for non-uniformity of robustness of a user’s
biometric characteristics. In particular, the system
hides the amount of error-tolerance required by a spe-
cific user. In other words, if the attacker has access
to the key encapsulation value, his effort to decide
how much error-tolerance the particular user required
should be roughly equal to the effort of breaking the
key encapsulation of that user.
2 RELATED WORK
There are numerous approaches described in liter-
ature to use biometrics for authentication purposes
or to extract cryptographic secrets from biometrics.
There are various systems using biometric informa-
tion during user login process (e.g., (Joyce and Gupta,
1990)). These schemes are characterized by the fact
that a model is stored in the system (e.g., of user
keystroke behavior). Upon login, the biometric mea-
surements (e.g., user keystroke behavior upon pass-
word entry) are then compared to this model. Since
these models can leak additional information, the ma-
jor drawback of these systems is that they do not pro-
vide increased security against offline attackers.
In (Soutar and Tomko, 1996), a technique is pro-
posed for the generation of a repeatable cryptographic
key from a fingerprint using optical computing and
image processing techniques. In (Ellison et al., 2000),
cryptographic keys are generated based on users’ an-
swers to a set of questions; subsequently, this sys-
tem was shown to be insecure (Bleichenbacher and
Nguyen, 2000). Davida, Frankel, and Matt (Davida
et al., 1998) propose a scheme which makes use of
error-correction and one-way hash functions. The for-
mer allows the system to tolerate a limited number of
errors in the biometric reading. This approach was
generalized and improved in (Juels and Wattenberg,
SECRET LOCKING: EXPLORING NEW APPROACHES TO BIOMETRIC KEY ENCAPSULATION
255