Academia.eduAcademia.edu

Outline

Cryptographic protocols for digital authentication and privacy

2017

Abstract

Les croissances constantes de l’Internet et des services associés ont conduit à des problématiques naturellement liées au domaine de la cryptographie, parmi lesquelles l’authentification et le respect de la vie privée des utilisateurs. L’utilisation désormais commune d’appareils connectés (smartphone, tablette, montre, …) comme moyen d’authentification amène à considérer la génération et/ou la gestion de clés cryptographiques par de tels appareils pour répondre à ces besoins. Les résonances cryptographiques identifiées de ces deux cas d’étude sont respectivement le domaine des Fuzzy Extractors (« Extracteurs de Flous » en français) et les schémas de signature de groupe. D’une part, cette thèse présente alors le premier Fuzzy Extractror non basé sur la distance de Hamming à être réutilisable (dans le modèle de l’oracle aléatoire non programmable). Ce faisant, nous avons alors pu concevoir un module de génération de clés cryptographiques permettant d'authentifier un utilisateur à ...

References (256)

  1. 5.2 Operation of our Scheme . . . . . . . . . . . . . . . . . . . . . . . .
  2. 5.3 Additional Properties . . . . . . . . . . . . . . . . . . . . . . . . . .
  3. 6 Formal Security Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.6.1 Anonymity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
  4. 6.2 Soundness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
  5. 7 Instantiation with the CFS scheme . . . . . . . . . . . . . . . . . . . . . . 5.7.1 CFS Distinguishability and Security . . . . . . . . . . . . . . . . . .
  6. 7.2 Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
  7. 8 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chapitre 6 : Stade TA4 -Signature de groupe en métrique Rang . . . . . . . . . . . . . . . . . . . . . . . . . . . .
  8. 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2 Background on Rank metric and Cryptography . . . . . . . . . . . . . . .
  9. 2.1 Rank Metric Codes . . . . . . . . . . . . . . . . . . . . . . . . . . .
  10. 2.2 Rank-Based Cryptography . . . . . . . . . . . . . . . . . . . . . . .
  11. 2.3 LRPC related cryptosystems . . . . . . . . . . . . . . . . . . . . . .
  12. 3 Definition and Security Model . . . . . . . . . . . . . . . . . . . . . . . . . 6.3.1 Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
  13. 3.2 Security Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
  14. 4 Rank Concatenated Stern's protocol . . . . . . . . . . . . . . . . . . . . . . 6.4.1 Problematic and Overview of our protocol . . . . . . . . . . . . . .
  15. 4.2 Rank Concatenated Stern's protocol (RCSP) . . . . . . . . . . . .
  16. 5 Our Rank-Based Group Signature Scheme . . . . . . . . . . . . . . . . . .
  17. 5.1 High Level Overview of our scheme . . . . . . . . . . . . . . . . . .
  18. 5.2 Algorithms KeyGen, Join and Sign . . . . . . . . . . . . . . . . . . .
  19. 5.3 Algorithms Verif and Open . . . . . . . . . . . . . . . . . . . . . . .
  20. 6 Security Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
  21. 7 Instantiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
  22. 8 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Entrée : Un profil Ω = (w 1 , w 2 , . . . , w n ).
  23. S envoie un challenge c et salt à U.
  24. U doit re-générer sk pour prouver sa connaissance du secret associé à pk • Il calcule sk = KDF(w 1 , w 2 . . . w n salt).
  25. • Il génère pk ← authGen(sk ).
  26. • Il génère π = authProve(sk, pk; c ).
  27. Sa vérifie que authVerif(π , pk) = 1. Il rejette l'authentification sinon. Chapitre 4 : Stade TA3 -FEs réutilisables et adaptatifs. Instanciation pour la différence d'ensembles. Chapitre 4 : Stade TA3 -FEs réutilisables et adaptatifs. Instanciation pour la différence d'ensembles.
  28. Contents 5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
  29. 2 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
  30. 2.1 Notation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 5.2.2 On code-based theory . . . . . . . . . . . . . . . . . . . . . . . 153
  31. 3 Cryptographic Primitives Revisited . . . . . . . . . . . . . . .
  32. 3.1 A variation on Stern's Protocol: Concatenated Stern's protocol 155 5.3.2 Testable weak Zero Knowledge . . . . . . . . . . . . . . . . . . 156 5.3.3 From CSP to Testable weak Zero Knowledge Proofs . . . . . . 159 5.3.4 Security of the Concatenated Stern's protocol . . . . . . . . . . 161
  33. 4 Definition and Security Model . . . . . . . . . . . . . . . . . . .
  34. 4.1 Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 5.4.2 Security Model . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
  35. 5 Our Code-Based Group Signature . . . . . . . . . . . . . . . .
  36. 5.1 High Level Overview . . . . . . . . . . . . . . . . . . . . . . . . 168 5.5.2 Operation of our Scheme . . . . . . . . . . . . . . . . . . . . . 169 5.5.3 Additional Properties . . . . . . . . . . . . . . . . . . . . . . . 172
  37. 6 Formal Security Analysis . . . . . . . . . . . . . . . . . . . . . .
  38. 6.1 Anonymity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 5.6.2 Soundness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
  39. 7 Instantiation with the CFS scheme . . . . . . . . . . . . . . . .
  40. 7.1 CFS Distinguishability and Security . . . . . . . . . . . . . . . 177 5.7.2 Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
  41. 8 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
  42. According to λ, generate: 1.1. a RSD instance rsd = (H s , s, ω s ): -H s a trapdoor matrix; -sk s its related secret key.
  43. 2. a R-PKC instance: -H c the public matrix key; -sk c its related secret key.
  44. 3. two random matrices A and B and an integer ω.
  45. gmsk := sk s , skO := (sk c , tr = [ ]).
  46. Return (gpk, gmsk, skO).
  47. Join(U i , gmsk = sk s , gpk)
  48. Use the trapdoor sk s on H s to output y i solving rsd.
  49. For l = 1 . . . l λ 2.1. Set c 1 , c 2 , c 3 , d 1 , d 2 , d 3 according to Figure 3, step 1.
  50. ch := H λ (m, cmt, r, c) ∈ 2 lλ .
  51. For i = 1 . . . l λ Generate rsp[l] according to ch[l] and Figure 3, step 3.
  52. Set Π = (cmt, ch, resp).
  53. Return σ = (Π, (r, c)).
  54. Figure 6.5: KeyGen, Join, Sign algorithms signature along with c. The result r -A.x must be equal to some tr[i], from which the signer's identity is learnt. These two algorithms appear in Figure 6.6. (a) Verif(gpk, m, σ)
  55. Parse Π = (cmt, ch, rsp)
  56. ch * := H λ (m, cmt, r, c) ∈ 2 l λ . If ( ch = ch), Return 0.
  57. For l = 1 . . . l λ 3.1. Check rsp[l] according to cmt[l], ch[l] and Figure 3.
  58. 2. If a verification fails, Return 0.
  59. Return 1. (b) Open(skO, gpk, m, σ)
  60. If (Verif(gpk, m, σ) = 0) Return ⊥.
  61. Parse skO = (sk c , tr).
  62. Set z = r -Ax
  63. For i = 1 . . . N If (tr[i] = z) Return U i .
  64. Return ⊥. Figure 6.6: Verif and Open algorithms
  65. M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, "A concrete security treatment of symmetric encryption," in Foundations of Computer Science, 1997. Proceedings., 38th Annual Symposium on. IEEE, 1997, pp. 394-403.
  66. S. Cauchie, "Method and system for authentication," Aug. 28 2013, eP Patent App. EP20,110,787,705.
  67. Q. Alamélou and S. Cauchie, "Assessment of a confidence level in the collection by a communication terminal of information relative to fingerprints," Apr. 27 2016, eP Patent App. EP20,140,306,675.
  68. Q. Alamélou, S. Cauchie, P. Gaborit, and O. Maas, "Authentification Numérique bassée sur les Fuzzy Extractors," in Atelier sur la Protection pour la Vie Privée, Cabourg, France, Jun. 2014.
  69. Q. Alamélou, P.-E. Berthier, C. Cachet, S. Cauchie, B. Fuller, and P. Gaborit, "Pseudoentropic isometries: A new framework for fuzzy extractor reusability," Cryptology ePrint Archive, Report 2016/1100, 2016.
  70. Q. Alamélou, O. Blazy, S. Cauchie, and P. Gaborit, "A Code-Based Group Signature Scheme," in The 9th International Workshop on Coding and Cryptography 2015 WCC2015, ser. Proceedings of the 9th International Workshop on Coding and Cryptography 2015 WCC2015, J.-P. T. Pascale Charpin, Nicolas Sendrier, Ed., Paris, France, Apr. 2015.
  71. --, "A Practical Group Signature Scheme based on Rank Metric," in Waifi 2016, Ghent, Belgium, Jul. 2016.
  72. --, "A code-based group signature scheme," Designs, Codes and Cryptography, vol. 82, no. 1, pp. 469-493, 2017.
  73. A. Yger and J.-A. Weil, Mathématiques L3-Mathématiques appliquées: Cours complet avec 500 tests et exercices corrigés. Pearson Education France, 2009.
  74. D. R.-C. R.C. Bose, "On a class of error correcting binary group codes," Information and Control, vol. 3, no. 1, pp. 68 -79, 1960.
  75. A. Hocquenghem, "Codes correcteurs d'erreurs," Chiffres, vol. 2, no. 147-156, pp. 8-5, 1959.
  76. Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Advances in Cryptology -EUROCRYPT 2004, ser. Lecture Notes in Computer Science, C. Cachin and J. Camenisch, Eds. Springer Berlin Heidelberg, 2004, vol. 3027, pp. 523-540.
  77. Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM J. Comput., vol. 38, no. 1, pp. 97-139, Mar. 2008.
  78. E. Berlekamp and L. Welch, "Error correction of algebraic block codes," Patent 4 633 470.
  79. A. Juels and M. Sudan, "A fuzzy vault scheme," Des. Codes Cryptography, vol. 38, no. 2, pp. 237-257, Feb. 2006.
  80. J. Faugère, V. Gauthier-Umaña, A. Otmani, L. Perret, and J. Tillich, "A distinguisher for high rate mceliece cryptosystems," in 2011 IEEE Information Theory Workshop, ITW 2011, Paraty, Brazil, October 16-20, 2011, 2011, pp. 282- 286.
  81. V. D. Goppa, "A new class of linear correcting codes," Problemy Peredachi Informatsii, vol. 6, no. 3, pp. 24-30, 1970.
  82. E. M. Gabidulin, "Theory of codes with maximum rank distance," Probl. Peredachi Inf., Volume 21, Issue 1, pages 3-16, 1985.
  83. P. Loidreau, "Properties of codes in rank metric," CoRR, vol. abs/cs/0610057, 2006.
  84. P. Gaborit, G. Murat, O. Ruatta, and G. Zémor, "Low Rank Parity Check codes and their application to cryptography," in WCC 13, Bergen, Norway, Apr. 2013.
  85. A. Kerckhoffs, "La cryptographie militaire," Journal des sciences militaires, pp. 5-83, January 1883.
  86. S. Goldwasser and S. Micali, "Probabilistic encryption," Journal of Computer and System Sciences, vol. 28, no. 2, pp. 270 -299, 1984.
  87. M. Bellare and P. Rogaway, "Random oracles are practical: A paradigm for designing efficient protocols," in Proceedings of the 1st ACM Conference on Computer and Communications Security, ser. CCS '93. New York, NY, USA: ACM, 1993, pp. 62-73.
  88. S. Goldwasser and Y. T. Kalai, "On the (in) security of the fiat-shamir paradigm," in Foundations of Computer Science, 2003. Proceedings. 44th Annual IEEE Symposium on. IEEE, 2003, pp. 102-113.
  89. R. Canetti, O. Goldreich, and S. Halevi, "The random oracle methodology, revisited," J. ACM, vol. 51, no. 4, pp. 557-594, Jul. 2004.
  90. N. Koblitz and A. J. Menezes, "The random oracle model: a twenty-year retrospective," Designs, Codes and Cryptography, vol. 77, no. 2, pp. 587-610, 2015.
  91. R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
  92. T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," in Workshop on the Theory and Application of Cryptographic Techniques. Springer, 1984, pp. 10-18.
  93. P. W. Shor, "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer," SIAM review, vol. 41, no. 2, pp. 303-332, 1999.
  94. R. G. Michael and S. J. David, "Computers and intractability: a guide to the theory of np-completeness," WH Free. Co., San Fr, 1979.
  95. E. Bresson, "Protocoles cryptographiques pour l'authentification et l'anonymat dans les groupes," Ph.D. dissertation, École polytechnique, 2002.
  96. O. Goldreich, Foundations of cryptography: volume 1, Basic Tools. Cambridge University Press, 2001.
  97. O. Goldreich, S. Goldwasser, and S. Micali, "How to construct random functions," Journal of the ACM (JACM), vol. 33, no. 4, pp. 792-807, 1986.
  98. N. Nisan and D. Zuckerman, "Randomness is linear in space," Journal of Computer and System Sciences, vol. 52, no. 1, pp. 43-52, 1996.
  99. L. Trevisan, "Extractors and pseudorandom generators," Journal of the ACM, vol. 48, no. 4, pp. 860-879, 2001.
  100. R. Shaltiel, "Recent developments in explicit constructions of extractors," Bulletin of the EATCS, vol. 77, no. 67-95, p. 10, 2002.
  101. H. Krawczyk, "Cryptographic extraction and key derivation: The hkdf scheme," in Annual Cryptology Conference. Springer, 2010, pp. 631-648.
  102. D. Dachman-Soled, R. Gennaro, H. Krawczyk, and T. Malkin, "Computational extractors and pseudorandomness," in Theory of Cryptography Conference. Springer, 2012, pp. 383-403.
  103. H. Krawczyk, R. Canetti, and M. Bellare, "Hmac: Keyed-hashing for message authentication," 1997.
  104. W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theor., vol. 22, no. 6, pp. 644-654, Sep. 2006.
  105. "Recommendation forthe Triple Data Encryption Algorithm (TDEA) Block Cipher," http://nvlpubs.nist.gov/nistpubs/Legacy/SP/ nistspecialpublication800-67r1.pdf.
  106. J. Daemen and V. Rijmen, The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media, 2013.
  107. M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, Relations among notions of security for public-key encryption schemes. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998, pp. 26-45.
  108. M. Dworkin, "Nist special publication 800-38b recommendation for block cipher modes of operation: The cmac mode for authentication," 2005.
  109. D. McGrew and J. Viega, "The galois/counter mode of operation (gcm)," Submission to NIST Modes of Operation Process, vol. 20, 2004.
  110. J. Song, R. Poovendran, J. Lee, and T. Iwata, "The aes-cmac algorithm," Tech. Rep., 2006.
  111. A. Fiat and A. Shamir, "How to prove yourself: Practical solutions to identification and signature problems," in Advances in Cryptology -CRYPTO '86, Santa Barbara, California, USA, 1986, Proceedings, 1986, pp. 186-194.
  112. S. Goldwasser, S. Micali, and R. L. Rivest, "A digital signature scheme secure against adaptive chosen-message attacks," SIAM J. Comput., vol. 17, no. 2, pp. 281-308, Apr. 1988.
  113. D. Chaum and E. van Heyst, "Group signatures," in Advances in Cryptology -EUROCRYPT '91, ser. Lecture Notes in Computer Science, D. Davies, Ed. Springer Berlin Heidelberg, 1991, vol. 547, pp. 257-265.
  114. G. Brassard, D. Chaum, and C. Crépeau, "Minimum disclosure proofs of knowledge," J. Comput. Syst. Sci., vol. 37, no. 2, pp. 156-189, Oct. 1988.
  115. M. O. Rabin, Digital signatures, R. J. Lipton, D. P. Dobkin, and A. K. Jones, Eds. Orlando, FL, USA: Academic Press, Inc., 1978.
  116. U. Fiege, A. Fiat, and A. Shamir, "Zero knowledge proofs of identity," in Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, ser. STOC '87. New York, NY, USA: ACM, 1987, pp. 210-217.
  117. U. Feige and A. Shamir, Zero Knowledge Proofs of Knowledge in Two Rounds. New York, NY: Springer New York, 1990, pp. 526-544.
  118. --, "Witness indistinguishable and witness hiding protocols," in Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, May 13-17, 1990, Baltimore, Maryland, USA, 1990, pp. 416-426.
  119. S. Goldwasser, S. Micali, and C. Rackoff, "The knowledge complexity of interactive proof-systems," in Proceedings of the Seventeenth Annual ACM Symposium on Theory of Computing, ser. STOC '85. New York, NY, USA: ACM, 1985, pp. 291-304.
  120. T. Itoh and K. Sakurai, "On the complexity of constant round zkip of possession of knowledge," in Proceedings of the International Conference on the Theory and Applications of Cryptology: Advances in Cryptology, ser. ASIACRYPT '91. London, UK, UK: Springer-Verlag, 1993, pp. 331-345.
  121. E. R. Berlekamp, R. J. McEliece, and H. C. A. van Tilborg, "On the inherent intractability of certain coding problems (corresp.)," IEEE Trans. Information Theory, vol. 24, no. 3, pp. 384-386, 1978.
  122. N. Courtois, M. Finiasz, and N. Sendrier, "How to achieve a McEliece-based digital signature scheme," in Advances in Cryptology -ASIACRYPT 2001, ser. LNCS, C. Boyd, Ed., vol. 2248. Springer, 2001, pp. 157-174.
  123. A. Vardy, "The intractability of computing the minimum distance of a code," Information Theory, IEEE Transactions on, vol. 43, no. 6, pp. 1757-1766, Nov 1997.
  124. R. McEliece, "A public-key cryptosystem based on algebraic," Coding Thv, vol. 4244, pp. 114-116, 1978.
  125. A. Canteaut and N. Sendrier, Cryptanalysis of the Original McEliece Cryptosystem. Springer Berlin Heidelberg, 1998.
  126. D. J. Bernstein, T. Lange, and C. Peters, Attacking and Defending the McEliece Cryptosystem. Springer Berlin Heidelberg, 2008.
  127. M. Finiasz and N. Sendrier, "Security bounds for the design of code-based cryptosystems," in International Conference on the Theory and Application of Cryptology and Information Security. Springer, 2009, pp. 88-105.
  128. D. J. Bernstein, T. Lange, and C. Peters, "Smaller decoding exponents: ball-collision decoding," in Annual Cryptology Conference. Springer, 2011, pp. 743-760.
  129. H. Niederreiter, "Knapsack-type cryptosystems and algebraic coding theory," Problems of Control and Information Theory, vol. 15, no. 2, pp. 159-166, 1986.
  130. Y. X. Li, R. H. Deng, and X. M. Wang, "On the equivalence of mceliece's and niederreiter's public-key cryptosystems," IEEE Transactions on Information Theory, vol. 40, no. 1, pp. 271-273, 1994.
  131. J. Stern, "A new paradigm for public key identification," IEEE Trans. Information Theory, vol. 42, no. 6, pp. 1757-1768, 1996.
  132. P. S. L. M. Barreto, P.-L. Cayrel, R. Misoczki, and R. Niebuhr, Quasi-Dyadic CFS Signatures. Springer Berlin Heidelberg, 2011.
  133. M. Finiasz, Parallel-CFS. Springer Berlin Heidelberg, 2011.
  134. D. Wagner, "A generalized birthday problem," in Annual International Cryptology Conference. Springer, 2002, pp. 288-304.
  135. C. H. Bennett, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM Journal on Computing, vol. 17, no. 2, pp. 210-229, 1988.
  136. R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld, "Physical one-way functions," Science, vol. 297, no. 5589, pp. 2026-2030, 2002.
  137. "Biometrics on the smartphone: The future of mobile authentication," http://whatsnext.nuance.com/customer-experience/ biometrics-smartphone-future-mobile-authentication/.
  138. "Mobile Biometric Authentication. White Paper." http://www.biometricupdate. com/wp-content/uploads/2014/08/Mobile-Biometric-Authentication-Report.pdf.
  139. "Notre sélection des meilleurs smartphones avec lecteur d'empreintes digitales," http://www.phonandroid.com/ selection-meilleurs-smartphones-lecteur-empreintes-digitales.html.
  140. "Zoom sur le capteur d'iris du samsung galaxy note 7," http://www.frandroid.com/ marques/samsung/381623 zoom-capteur-diris-samsung-galaxy-note-7.
  141. Bibliographie [77] "La reconnaissance de l'iris déverrouillera 300 millions de smartphones en 2021," http://www.usine-digitale.fr/article/ la-reconnaissance-de-l-iris-deverrouillera-300-millions-de-smartphones-en-2021.
  142. N44344.
  143. A. Juels and M. Wattenberg, "A fuzzy commitment scheme," in Proceedings of the 6th ACM Conference on Computer and Communications Security, ser. CCS '99. New York, NY, USA: ACM, 1999, pp. 28-36.
  144. G. I. Davida, Y. Frankel, and B. J. Matt, "On enabling secure applications through off-line biometric identification," in Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), May 1998, pp. 148-157.
  145. G. I. Davida, Y. Frankel, B. J. Matt, and R. Peralta, "On the relation of error correction and cryptography to an off line biometric based identification scheme," 1999.
  146. J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, and G. Zemor, "Optimal iris fuzzy sketches," in 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems, Sept 2007, pp. 1-6.
  147. J.-P. Linnartz and P. Tuyls, New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003, pp. 393-402.
  148. B. Fuller, X. Meng, and L. Reyzin, Computational Fuzzy Extractors. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 174-193.
  149. G. Cohen and G. Zemor, "The wiretap channel applied to biometrics," in ISITA, Parma, Italy, 2004, pp. 1-5. [Online]. Available: https://hal.archives-ouvertes.fr/ hal-00359822
  150. X. Boyen, "Reusable cryptographic fuzzy extractors," in Proceedings of the 11th ACM Conference on Computer and Communications Security, ser. CCS '04. New York, NY, USA: ACM, 2004, pp. 82-91.
  151. X. Boyen, Y. Dodis, J. Katz, R. Ostrovsky, and A. Smith, Secure Remote Authentication Using Biometric Data. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005, pp. 147-163.
  152. Y. Dodis, J. Katz, L. Reyzin, and A. Smith, Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006, pp. 232-250.
  153. R. Cramer, Y. Dodis, S. Fehr, C. Padró, and D. Wichs, Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008, pp. 471-488.
  154. Y. Dodis, B. Kanukurthi, J. Katz, L. Reyzin, and A. D. Smith, "Robust fuzzy extractors and authenticated key agreement from close secrets," IEEE Trans. Information Theory, vol. 58, no. 9, pp. 6207-6222, 2012.
  155. K. Simoens, P. Tuyls, and B. Preneel, "Privacy weaknesses in biometric sketches," in 2009 30th IEEE Symposium on Security and Privacy, 2009, pp. 188-203.
  156. M. Blanton and M. Aliasgari, "On the (non-)reusability of fuzzy sketches and extractors and security improvements in the computational setting," IACR Cryptology ePrint Archive, vol. 2012, p. 608, 2012.
  157. --, "Analysis of reusability of secure sketches and fuzzy extractors," IEEE Trans. Information Forensics and Security, vol. 8, no. 9, pp. 1433-1445, 2013.
  158. O. Regev, "On lattices, learning with errors, random linear codes, and cryptography," Journal of the ACM (JACM), vol. 56, no. 6, p. 34, 2009.
  159. R. Canetti, B. Fuller, O. Paneth, L. Reyzin, and A. Smith, Advances in Cryptology -EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016, ch. Reusable Fuzzy Extractors for Low-Entropy Distributions, pp. 117-146.
  160. I. Buhan, J. Doumen, P. H. Hartel, and R. N. J. Veldhuis, "Fuzzy extractors for continuous distributions," in Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, 2007, pp. 353-355.
  161. V. P. Parente and J. van de Graaf, A Practical Fuzzy Extractor for Continuous Features. Cham: Springer International Publishing, 2016, pp. 241-258.
  162. F. Monrose, M. K. Reiter, Q. Li, and S. Wetzel, "Cryptographic key generation from voice," in Proceedings of the 2001 IEEE Symposium on Security and Privacy, ser. SP '01. Washington, DC, USA: IEEE Computer Society, 2001, pp. 202-.
  163. Y.-J. Chang, W. Zhang, and T. Chen, "Biometrics-based cryptographic key generation," in 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763), vol. 3, June 2004, pp. 2203-2206 Vol.3.
  164. W. Zhang, Y.-J. Chang, and T. Chen, "Optimal thresholding for key generation based on biometrics," in Image Processing, 2004. ICIP'04. 2004 International Conference on, vol. 5. IEEE, 2004, pp. 3451-3454.
  165. A. Van Herrewege, S. Katzenbeisser, R. Maes, R. Peeters, A.-R. Sadeghi, I. Verbauwhede, and C. Wachsmann, Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs. Springer Berlin Heidelberg, 2012.
  166. "GlobalPlatform made simple guide: Secure Element," https://www. globalplatform.org/mediaguideSE.asp.
  167. "Host-based Card Emulation," https://developer.android.com/guide/topics/ connectivity/nfc/hce.html.
  168. "Visa Ready Program," https://technologypartner.visa.com/VisaReady/ MobilePayments.aspx#CloudBasedPayments.
  169. "Mastercard OnLine. Documentation," http://mastercard-mobilepartner.com/ documentation.html#2.
  170. "Référentiels d'Exigences," https://www.ssi.gouv.fr/administration/qualifications/ prestataires-de-services-de-confiance-qualifies/referentiels-exigences/.
  171. "Authentification. règles et recommandations concernant les mécanismes d'authentification de niveau de robustesse standard," https://www.ssi.gouv.fr/ archive/fr/politique produit/catalogue/pdf/authentification robustesse standard v0-13.pdf.
  172. "Recommandations cnil," https://www.cnil.fr/professionnel.
  173. P. Eckersley, "How unique is your web browser?" in Privacy Enhancing Technologies, 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings, 2010, pp. 1-18.
  174. A. Kurtz, H. Gascon, T. Becker, K. Rieck, and F. Freiling, "Fingerprinting mobile devices using personalized configurations," Proceedings on Privacy Enhancing Technologies, vol. 2016, no. 1, pp. 4-19, 2016.
  175. "Bluekrypt. cryptographic key length recommendation." https://www.keylength. com/fr/5/.
  176. "Panopticlick. Is your browser safe against tracking?" https://panopticlick.eff.org/.
  177. "Am I Unique?" https://amiunique.org/.
  178. "Fingerprintjs2," https://github.com/Valve/fingerprintjs2.
  179. "FIDO Alliance," https://fidoalliance.org/?s=passwor.
  180. "FIDO Alliance," https://fidoalliance.org/fido-alliance-opens-worldwide-cooperation-and-liaison-
  181. M. E. Khan and F. Khan, "A comparative study of white box, black box and grey box testing techniques," International Journal of Advanced Computer Science and Applications (IJACSA), vol. 3, no. 6, 2012.
  182. P. C. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. Springer Berlin Heidelberg, 1996.
  183. S. Chow, P. Eisen, H. Johnson, and P. C. Van Oorschot, White-Box Cryptography and an AES Implementation. Springer Berlin Heidelberg, 2003.
  184. B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang, On the (Im)possibility of Obfuscating Programs, 2001.
  185. --, "On the (im)possibility of obfuscating programs," J. ACM, vol. 59, no. 2, pp. 6:1-6:48, May 2012.
  186. Z. Brakerski and O. Dagmi, "Shorter circuit obfuscation in challenging security models," in Security and Cryptography for Networks -10th International Conference, SCN 2016, Amalfi, Italy, August 31 -September 2, 2016, Proceedings, 2016, pp. 551-570.
  187. Y. D. Mulder, "White-box cryptography. analysis of white-box aes implementations." Ph.D. dissertation, KU LEUVEN, 2014.
  188. T. Lepoint, M. Rivain, Y. D. Mulder, P. Roelse, and B. Preneel, "Two attacks on a white-box AES implementation," in Selected Areas in Cryptography -SAC 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers, 2013, pp. 265-285.
  189. "Device Fingerprinting and Fraud Protection ," Device-Fingerprinting-and-Online-Fraud-Protection-Whitepaper.pdf.
  190. U. Rührmair, F. Sehnke, J. Sölter, G. Dror, S. Devadas, and J. Schmidhuber, "Modeling attacks on physical unclonable functions," in Proceedings of the 17th ACM Conference on Computer and Communications Security, ser. CCS '10. New York, NY, USA: ACM, 2010, pp. 237-249. [Online]. Available: http://doi.acm.org/10.1145/1866307.1866335
  191. U. Ruhrmair and M. van Dijk, "Pufs in security protocols: Attack models and security evaluations," 2012 IEEE Symposium on Security and Privacy, pp. 286- 300, 2013.
  192. "GGlobalPlatform made simple guide: Trusted Execution Environment (TEE) Guide," http://www.globalplatform.org/mediaguidetee.asp# Toc419214135.
  193. K. Boda, A. M. Földes, G. G. Gulyás, and S. Imre, "User tracking on the web via cross-browser fingerprinting," in Proceedings of the 16th Nordic Conference on Information Security Technology for Applications, ser. NordSec'11. Berlin, Heidelberg: Springer-Verlag, 2012, pp. 31-46.
  194. K. Mowery and H. Shacham, "Pixel perfect: Fingerprinting canvas in HTML5," in Proceedings of W2SP 2012, M. Fredrikson, Ed. IEEE Computer Society, May 2012.
  195. N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens, and G. Vigna, "Cookieless monster: Exploring the ecosystem of web-based device fingerprinting," in Proceedings of the 2013 IEEE Symposium on Security and Privacy, ser. SP '13.
  196. Washington, DC, USA: IEEE Computer Society, 2013, pp. 541-555.
  197. G. Acar, C. Eubank, S. Englehardt, M. Juarez, A. Narayanan, and C. Diaz, "The web never forgets: Persistent tracking mechanisms in the wild," in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, ser. CCS '14. New York, NY, USA: ACM, 2014, pp. 674-689.
  198. S. Kamkar, "Evercookie-virtually irrevocable persistent cookies," His Blog, vol. 9, 2010.
  199. A. Soltani, S. Canty, Q. Mayo, L. Thomas, and C. J. Hoofnagle, "Flash cookies and privacy." in AAAI spring symposium: intelligent information privacy management, vol. 2010, 2010, pp. 158-163.
  200. B. Krishnamurthy and C. Wills, "Privacy diffusion on the web: a longitudinal perspective," in Proceedings of the 18th international conference on World wide web. ACM, 2009, pp. 541-550.
  201. J. R. Mayer and J. C. Mitchell, "Third-party web tracking: Policy and technology," in 2012 IEEE Symposium on Security and Privacy. IEEE, 2012, pp. 413-427.
  202. J. Lukas, J. Fridrich, and M. Goljan, "Digital camera identification from sensor pattern noise," IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 205-214, 2006.
  203. M. Chen, J. Fridrich, M. Goljan, and J. Lukás, "Determining image origin and integrity using sensor noise," IEEE Transactions on Information Forensics and Security, vol. 3, no. 1, pp. 74-90, 2008.
  204. H. Bojinov, Y. Michalevsky, G. Nakibly, and D. Boneh, "Mobile device identification via sensor fingerprinting," arXiv preprint arXiv:1408.1416, 2014.
  205. A. Das, N. Borisov, and M. Caesar, "Do you hear what i hear?: Fingerprinting smart devices through embedded acoustic components," in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, ser. CCS '14. New York, NY, USA: ACM, 2014, pp. 441-452.
  206. Z. Zhou, W. Diao, X. Liu, and K. Zhang, "Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound," in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2014, pp. 429-440.
  207. S. Dey, N. Roy, W. Xu, R. R. Choudhury, and S. Nelakuditi, "Accelprint: Imperfections of accelerometers make smartphones trackable." in NDSS, 2014.
  208. S. Seneviratne, A. Seneviratne, P. Mohapatra, and A. Mahanti, "Predicting user traits from a snapshot of apps installed on a smartphone," SIGMOBILE Mob. Comput. Commun. Rev., vol. 18, no. 2, pp. 1-8, Jun. 2014.
  209. J. P. Achara, G. Acs, and C. Castelluccia, "On the unicity of smartphone applications," in Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, ser. WPES '15. New York, NY, USA: ACM, 2015, pp. 27- 36.
  210. A. K. Jain, K. Nandakumar, and A. Ross, "50 years of biometric research: Accomplishments, challenges, and opportunities," Pattern Recognition Letters, 2016.
  211. B. Barak, "Lecture 4 -Computational Indistinguishability, Pseudorandom Generators." https://www.cs.princeton.edu/courses/archive/fall07/cos433/lec4. pdf.
  212. "Most Common First Names and Last Names in the U.S." http://names.mongabay. com/male names.htm.
  213. "Rooter Security. Choosing an SSID." http://routersecurity.org/SSID.php.
  214. "Recommended settings for Wi-Fi routers and access points." https://support.apple. com/en-us/HT202068.
  215. "4 GSM 3GPP Specifications and Rulesets." https://docs.oracle.com/cd/E36032 01/doc.722/e36045/gsm mobile cartridge.htm.
  216. "International Mobile Subscriber Identity." https://fr.wikipedia.org/wiki/ International Mobile Subscriber Identity.
  217. J. Daugman, "How iris recognition works," IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, pp. 21-30, 2002.
  218. K. Nandakumar, A. K. Jain, and S. Pankanti, "Fingerprint-based fuzzy vault: Implementation and performance," IEEE Transactions on Information Forensics and Security, vol. 2, no. 4, pp. 744-757, 2007.
  219. A. K. Jain, K. Nandakumar, and A. Nagar, "Biometric template security," EURASIP J. Adv. Signal Process, vol. 2008, pp. 113:1-113:17, Jan. 2008.
  220. U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, "Biometric cryptosystems: issues and challenges," Proceedings of the IEEE, vol. 92, no. 6, pp. 948-960, 2004.
  221. U. Uludag, A. Ross, and A. Jain, "Biometric template selection and update: a case study in fingerprints," Pattern Recognition, vol. 37, no. 7, pp. 1533-1542, 2004.
  222. J. Håstad, R. Impagliazzo, L. A. Levin, and M. Luby, "A pseudorandom generator from any one-way function," SIAM Journal on Computing, vol. 28, no. 4, pp. 1364- 1396, 1999.
  223. C.-Y. Hsiao, C.-J. Lu, and L. Reyzin, "Conditional computational entropy, or toward separating pseudoentropy from compressibility," in Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 2007, pp. 169-186.
  224. M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, "A concrete security treatment of symmetric encryption," in Proceedings of the 38th Annual Symposium on Foundations of Computer Science, ser. FOCS '97. Washington, DC, USA: IEEE Computer Society, 1997, pp. 394-.
  225. M. Bellare, H. Shi, and C. Zhang, "Foundations of group signatures: The case of dynamic groups," in Topics in Cryptology -CT-RSA 2005, ser. Lecture Notes in Computer Science, A. Menezes, Ed. Springer Berlin Heidelberg, 2005, vol. 3376, pp. 136-153.
  226. J. Stern, "A new identification scheme based on syndrome decoding," in Advances in Cryptology -CRYPTO' 93, ser. Lecture Notes in Computer Science, D. Stinson, Ed. Springer Berlin Heidelberg, 1994, vol. 773, pp. 13-21.
  227. M. Bellare, D. Micciancio, and B. Warinschi, "Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions," in Advances in Cryptology -EUROCRYPT 2003, ser. Lecture Notes in Computer Science, E. Biham, Ed. Springer Berlin Heidelberg, 2003, vol. 2656, pp. 614-629.
  228. D. Boneh, X. Boyen, and H. Shacham, "Short group signatures," in Advances in Cryptology -CRYPTO 2004, ser. Lecture Notes in Computer Science, M. Franklin, Ed. Springer Berlin Heidelberg, 2004, vol. 3152, pp. 41-55.
  229. D. Boneh and H. Shacham, "Group signatures with verifier-local revocation," in Proceedings of CCS 2004. ACM Press, 2004, pp. 168-177.
  230. J. Camenisch and A. Lysyanskaya, "Signature schemes and anonymous credentials from bilinear maps," in Advances in Cryptology -CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15- 19, 2004, Proceedings, 2004, pp. 56-72.
  231. C. Delerablée and D. Pointcheval, "Dynamic fully anonymous short group signatures," in Progressin Cryptology -VIETCRYPT 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers, 2006, pp. 193-210.
  232. J. Groth, "Fully anonymous group signatures without random oracles," in Advances in Cryptology -ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings, 2007, pp. 164-180.
  233. A. Kiayias, Y. Tsiounis, and M. Yung, "Traceable signatures," in Advances in Cryptology -EUROCRYPT 2004, ser. Lecture Notes in Computer Science, C. Cachin and J. Camenisch, Eds. Springer Berlin Heidelberg, 2004, vol. 3027, pp. 571-589.
  234. B. Libert and M. Yung, "Efficient traceable signatures in the standard model," in Pairing-Based Cryptography -Pairing 2009, ser. Lecture Notes in Computer Science, H. Shacham and B. Waters, Eds. Springer Berlin Heidelberg, 2009, vol. 5671, pp. 187-205.
  235. S. Gordon, J. Katz, and V. Vaikuntanathan, "A group signature scheme from lattice assumptions," in Advances in Cryptology -ASIACRYPT 2010, ser. Lecture Notes in Computer Science, M. Abe, Ed. Springer Berlin Heidelberg, 2010, vol. 6477, pp. 395-412.
  236. F. Laguillaumie, A. Langlois, B. Libert, and D. Stehlé, "Lattice-based group signatures with logarithmic signature size," in Advances in Cryptology - ASIACRYPT 2013, ser. Lecture Notes in Computer Science, K. Sako and P. Sarkar, Eds. Springer Berlin Heidelberg, 2013, vol. 8270, pp. 41-61.
  237. A. Langlois, S. Ling, K. Nguyen, and H. Wang, "Lattice-based group signature scheme with verifier-local revocation," in PKC 2014, ser. Lecture Notes in Computer Science, H. Krawczyk, Ed. Springer Berlin Heidelberg, 2014, vol. 8383, pp. 345-361.
  238. S. Ling, K. Nguyen, and H. Wang, "Group signatures from lattices: Simpler, tighter, shorter, ring-based," in PKC 2015, ser. Lecture Notes in Computer Science, J. Katz, Ed. Springer Berlin Heidelberg, 2015, vol. 9020, pp. 427-449.
  239. P. Q. Nguyen, J. Zhang, and Z. Zhang, "Simpler efficient group signatures from lattices," in Public-Key Cryptography -PKC 2015 -18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -April 1, 2015, Proceedings, 2015, pp. 401-426.
  240. M. F. Ezerman, H. T. Lee, S. Ling, K. Nguyen, and H. Wang, "A provably secure group signature scheme from code-based assumptions," in Advances in Cryptology - ASIACRYPT 2015 -21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part I, 2015, pp. 260-285.
  241. B. Libert, F. Mouhartem, and K. Nguyen, "A lattice-based group signature scheme with message-dependent opening," in Applied Cryptography and Network Security -14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings, 2016, pp. 137-155.
  242. S. Arora, L. Babai, J. Stern, and Z. Sweedyk, "The hardness of approximate optimia in lattices, codes, and systems of linear equations," in 34th Annual Symposium on Foundations of Computer Science, Palo Alto, California, USA, 3-5 November 1993, 1993, pp. 724-733.
  243. M. Bellare, C. Namprempre, D. Pointcheval, and M. Semanko, "The one-more- rsa-inversion problems and the security of chaum's blind signature scheme," J. Cryptology, vol. 16, no. 3, pp. 185-215, 2003.
  244. K. P. Mathew, S. Vasant, and C. P. Rangan, A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory. Cham: Springer International Publishing, 2014, pp. 342-362.
  245. A. Becker, A. Joux, A. May, and A. Meurer, "Decoding random binary linear codes in 2 n/20: How 1 + 1 = 0 improves information set decoding," in Advances in Cryptology -EUROCRYPT 2012 -31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15- 19, 2012. Proceedings, 2012, pp. 520-536.
  246. B. Libert, S. Ling, F. Mouhartem, K. Nguyen, and H. Wang, Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016, pp. 373-403. [Online]. Available: http://dx.doi.org/10.1007/978-3-662-53890-6 13
  247. P. Gaborit, O. Ruatta, J. Schrek, and G. Zémor, "Ranksign: An efficient signature algorithm based on the rank metric," in Post-Quantum Cryptography, ser. Lecture Notes in Computer Science, M. Mosca, Ed. Springer International Publishing, 2014, vol. 8772, pp. 88-107.
  248. P. Gaborit, O. Ruatta, J. Schrek, and G. Zémor, "Ranksign : an efficient signature algorithm based on the rank metric," CoRR, vol. abs/1606.00629, 2016.
  249. P. Gaborit, J. Schrek, and G. Zémor, "Full cryptanalysis of the chen identification protocol," in Post-Quantum Cryptography, ser. Lecture Notes in Computer Science, B.-Y. Yang, Ed. Springer Berlin Heidelberg, 2011, vol. 7071, pp. 35-50.
  250. J. Fischer and J. Stern, "An efficient pseudo-random generator provably as secure as syndrome decoding," in Advances in Cryptology -EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding, 1996, pp. 245-255.
  251. B. Libert, S. Ling, K. Nguyen, and H. Wang, Zero-Knowledge Arguments for Lattice- Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016.
  252. P. Gaborit, O. Ruatta, J. Schrek, and G. Zémor, "New results for rank-based cryptography," in Progress in Cryptology -AFRICACRYPT 2014 -7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings, 2014, pp. 1-12.
  253. P. Gaborit and G. Zémor, "On the hardness of the decoding and the minimum distance problems for rank codes," IEEE Transactions on Information Theory, vol. 62, no. 12, pp. 7245-7252, 2016.
  254. P. Gaborit, O. Ruatta, and J. Schrek, "On the complexity of the rank syndrome decoding problem," Information Theory, IEEE Transactions on, vol. 62, no. 2, pp. 1006-1019, Feb 2016.
  255. P. Gaborit, A. Hauteville, and J. Tillich, "Ranksynd a PRNG based on rank metric," in Post-Quantum Cryptography -7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings, 2016, pp. 18-28.
  256. K. Chen, "A new identification algorithm," in Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, 1995, pp. 244-249.