1,576 research outputs found
On t-revealing codes in binary Hamming spaces
In this paper, we introduce t-revealing codes in the binary Hamming space F-n. Let C subset of F-n be a code and denote by I-t (C; x) the set of elements of C which are within (Hamming) distance t from a word x is an element of F-n. A code C is t-revealing if the majority voting on the coordinates of the words in I-t (C; x) gives unambiguously x. These codes have applications, for instance, to the list decoding problem of the Levenshtein's channel model, where the decoder provides a list based on several different outputs of the channel with the same input, and to the information retrieval problem of the Yaakobi-Bruck model of associative memories. We give t-revealing codes which improve some of the key parameters for these applications compared to earlier code constructions. (C) 2019 Elsevier Inc. All rights reserved
Code generator matrices as RNG conditioners
We quantify precisely the distribution of the output of a binary random
number generator (RNG) after conditioning with a binary linear code generator
matrix by showing the connection between the Walsh spectrum of the resulting
random variable and the weight distribution of the code. Previously known
bounds on the performance of linear binary codes as entropy extractors can be
derived by considering generator matrices as a selector of a subset of that
spectrum. We also extend this framework to the case of non-binary codes
Satisfiability, sequence niches, and molecular codes in cellular signaling
Biological information processing as implemented by regulatory and signaling
networks in living cells requires sufficient specificity of molecular
interaction to distinguish signals from one another, but much of regulation and
signaling involves somewhat fuzzy and promiscuous recognition of molecular
sequences and structures, which can leave systems vulnerable to crosstalk. This
paper examines a simple computational model of protein-protein interactions
which reveals both a sharp onset of crosstalk and a fragmentation of the
neutral network of viable solutions as more proteins compete for regions of
sequence space, revealing intrinsic limits to reliable signaling in the face of
promiscuity. These results suggest connections to both phase transitions in
constraint satisfaction problems and coding theory bounds on the size of
communication codes
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
We provide formal definitions and efficient secure techniques for
- turning noisy information into keys usable for any cryptographic
application, and, in particular,
- reliably and securely authenticating biometric data.
Our techniques apply not just to biometric information, but to any keying
material that, unlike traditional cryptographic keys, is (1) not reproducible
precisely and (2) not distributed uniformly. We propose two primitives: a
"fuzzy extractor" reliably extracts nearly uniform randomness R from its input;
the extraction is error-tolerant in the sense that R will be the same even if
the input changes, as long as it remains reasonably close to the original.
Thus, R can be used as a key in a cryptographic application. A "secure sketch"
produces public information about its input w that does not reveal w, and yet
allows exact recovery of w given another value that is close to w. Thus, it can
be used to reliably reproduce error-prone biometric inputs without incurring
the security risk inherent in storing them.
We define the primitives to be both formally secure and versatile,
generalizing much prior work. In addition, we provide nearly optimal
constructions of both primitives for various measures of ``closeness'' of input
data, such as Hamming distance, edit distance, and set difference.Comment: 47 pp., 3 figures. Prelim. version in Eurocrypt 2004, Springer LNCS
3027, pp. 523-540. Differences from version 3: minor edits for grammar,
clarity, and typo
- …