An improvement of pseudorandomization against unbounded attack algorithms - The case of fingerprint codes

Koji Nuida, Goichiro Hanaoka

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Recently, the authors proposed an evaluation technique for pseudorandom generator-based randomness reduction of cryptographic schemes against computationally unbounded attack algorithms. In this article, we apply the technique to the case of fingerprint codes and verify the effectiveness. Then we propose a technique that improves the randomness reduction by dividing the target randomness into suitable parts and using a separate pseudorandom generator for each part. Considering fingerprint codes as a typical example, we give a theoretical evaluation of the proposed technique, and also a numerical evaluation showing that our technique improves the effect of randomness reduction to about 29 times as good as the plain randomness reduction in a reasonable setting.

Original languageEnglish
Title of host publicationInformation Theoretic Security - 4th International Conference, ICITS 2009, Revised Selected Papers
Pages213-230
Number of pages18
DOIs
Publication statusPublished - 2010
Externally publishedYes
Event4th International Conference on Information Theoretic Security, ICITS 2009 - Shizuoka, Japan
Duration: Dec 3 2009Dec 6 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5973 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference4th International Conference on Information Theoretic Security, ICITS 2009
Country/TerritoryJapan
CityShizuoka
Period12/3/0912/6/09

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'An improvement of pseudorandomization against unbounded attack algorithms - The case of fingerprint codes'. Together they form a unique fingerprint.

Cite this