 Research
 Open Access
Quantization in zero leakage helper data schemes
 Joep de Groot^{1, 4},
 Boris Škorić^{2},
 Niels de Vreede^{3} and
 JeanPaul Linnartz^{1}Email author
https://doi.org/10.1186/s136340160353z
© de Groot et al. 2016
 Received: 22 October 2015
 Accepted: 20 April 2016
 Published: 5 May 2016
Abstract
A helper data scheme (HDS) is a cryptographic primitive that extracts a highentropy noisefree string from noisy data. Helper data schemes are used for preserving privacy in biometric databases and for physical unclonable functions. HDSs are known for the guided quantization of continuousvalued sources as well as for repairing errors in discretevalued (digitized) sources. We refine the theory of helper data schemes with the zero leakage (ZL) property, i.e., the mutual information between the helper data and the extracted secret is zero. We focus on quantization and prove that ZL necessitates particular properties of the helper data generating function: (1) the existence of “sibling points”, enrollment values that lead to the same helper data but different secrets and (2) quantile helper data.
We present an optimal reconstruction algorithm for our ZL scheme, that not only minimizes the reconstruction error rate but also yields a very efficient implementation of the verification. We compare the error rate to schemes that do not have the ZL property.
Keywords
 Biometrics
 Fuzzy extractor
 Helper data
 Privacy
 Secrecy leakage
 Secure sketch
1 Introduction
1.1 Biometric authentication: the noise problem
Biometrics have become a popular solution for authentication or identification, mainly because of their convenience. A biometric feature cannot be forgotten (like a password) or lost (like a token). Nowadays identity documents such as passports nearly always include biometric features extracted from fingerprints, faces, or irises. Governments store biometric data for forensic investigations. Some laptops and smart phones authenticate users by means of biometrics.
Strictly speaking, biometrics are not secret. In fact, fingerprints can be found on many objects. It is hard to prevent one’s face or iris from being photographed. However, storing biometric features in an unprotected, open database. Introduces both security and privacy risks. Security risks include the production of fake biometrics from the stored data, e.g., rubber fingers [1, 2]. These fake biometrics can be used to obtain unauthorized access to services, to gain confidential information or to leave fake evidence at crime scenes. We also mention two privacy risks. (1) Some biometrics are known to reveal diseases and disorders of the user. (2) Unprotected storage allows for crossmatching between databases.
These security and privacy problems cannot be solved by simply encrypting the database. It would not prevent insider attacks, i.e., attacks or misuse by people who are authorized to access the database. As they legally possess the decryption keys, database encryption does not stop them.
The problem of storing biometrics is very similar to the problem of storing passwords. The standard solution is to store hashed passwords. Cryptographic hash functions are oneway functions, i.e., inverting them to calculate a secret password from a public hash value is computationally infeasible. Even inside attackers who have access to all the hashed passwords cannot deduce the user passwords from them.
Straightforward application of this hashing method to biometrics does not work for biometrics, however. Biometric measurements are noisy, which causes (small) differences between the digital representation of the enrollment measurement and the digitized measurement during verification. Particularly if the biometric value lies near a quantization boundary, a small amount of noise can flip the discretized value and trigger an avalanche of bit flips at the output of the hash.
1.2 Helper data schemes
The solution to the noise problem is to use a helper data scheme (HDS) [3, 4]. A HDS consists of two algorithms, Gen and Rep. In the enrollment phase, the Gen algorithm takes a noisy (biometric) value as input and generates not only a secret but also public data called helper data. The Rep algorithm is used in the verification phase. It has two inputs: the helper data and a fresh noisy (biometric) value obtained from the same source. The Rep algorithm outputs an estimator for the secret that was generated by Gen.
The helper data makes it possible to derive the (discrete) secret reproducibly from noisy measurements, i.e., to perform error correction, while not revealing too much information about the enrollment measurement. The noiseresistant secret can be hashed as in the password protection scheme.
1.3 A twostage approach
We describe a commonly adopted twostage approach for realvalued sources, as for instance presented in ([5], Chap. 16). The main idea is as follows. A firststage HDS performs quantization (discretization) of the realvalued input. Helper data is applied in the “analog” domain, i.e., before quantization. Typically, the helper data consists of a ‘pointer’ to the center of a quantization interval. The quantization intervals can be chosen at will, which allows for optimizations of various sorts [6–8].
After the first stage, there is typically still some noise in the quantized output. A secondstage HDS employs digital error correction techniques, for instance the code offset method (also known as Fuzzy Commitment) [3, 9] or a variant thereof [10, 11].
Such a twostage approach is also common practice in communication systems that suffer from unreliable (wireless) channels: the signal conditioning prior to the quantization involves optimization of signal constellations and multidimensional transforms. The discrete mathematical operations, such as error correction decoding, are known to be effective only for sufficiently errorfree signals. According to the asymptotic Elias bound ([12], Chap. 17), at bit error probabilities above 10 % one cannot achieve code rates better than 0.5. Similarly, in biometric authentication, optimization of the first stage appears essential to achieve adequate system performance. The design of the first stage is the prime motivation, and key contribution, of this paper.
At enrollment, a person’s biometric x̲ is obtained. The transform is applied, yielding features \((x_{i})_{i=1}^{M}\). The Gen algorithm of the firststage HDS is applied to each feature independently. This gives continuous helper data \((w_{i})_{i=1}^{M}\) and short secret strings s _{1},…,s _{ M } which may or may not have equal length, depending on the signaltonoise ratio of the features. All these secrets are combined into one highentropy secret k, e.g., by concatenating them after Graycoding. Biometric features are subject to noise, which will lead to some errors in the reproduced secret \(\hat {k}\); hence, a second stage of error correction is done with another HDS. The output of the secondstage Gen algorithm is discrete helper data r and a practically noiseless string c. The hash h(c∥z) is stored in the enrollment database, along with the helper data \((w_{i})_{i=1}^{M}\) and r. Here,z is salt, a random string to prevent easy crossmatching.
In the authentication phase, a fresh biometric measurement y̲ is obtained and split into components \((y_{i})_{i=1}^{M}\). For each i independently, the estimator \(\hat {s}_{i}\) is computed from y _{ i } and w _{ i }. The \(\hat s_{i}\) are combined into an estimator \(\hat {k}\), which is then input into the 2ndstage HDS reconstruction together with r. The result is an estimator \(\hat {c}\). Finally, \(h(\hat {c}\z)\) is compared with the stored hash h(c∥z).
1.4 Fuzzy extractors and secure sketches

Fuzzy extractor
The probability distribution of s given w has to be (nearly) uniform.

Secure sketch
s given w must have high entropy, but does not have to be uniform. Typically, s is equal to (a discretized version of) x.
The FE is typically used for the extraction of cryptographic keys from noisy sources such as physical unclonable functions (PUFs) [14–16]. Some fixed quantization schemes support the use of a fuzzy extractor, provided that the quantization intervals can be chosen such that each secret s is equiprobable, as in [17].
The SS is very well suited to the biometrics scenario described above.
1.5 Security and privacy
In the HDS context, the main privacy question is how much information, and which information, about the biometric x̲ is leaked by the helper data. Ideally, the helper data would contain just enough information to enable the error correction. Roughly speaking, this means that the vector \({\underbar {w}=(w_{i})_{i=1}^{M}}\) consists of the noisy “least significant bits” of x̲, which typically do not reveal sensitive information since they are noisy anyway. In order to make this kind of intuitive statement more precise, one studies the informationtheoretic properties of HDSs. In the system as sketched in Fig. 1, the mutual information^{1} I(C;W̲,R) is of particular interest: it measures the leakage about the string c caused by the fact that the attacker observes w̲ and r. By properly separating the “most significant digits” of x̲ from the “least significant digits”, it is possible to achieve I(C;W̲,R)=0. We call this zero secrecy leakage or, more compactly, zero leakage (ZL).^{2} HDSs with the ZL property are very interesting for quantifying privacy guarantees: if a privacysensitive piece of a biometric is fully contained in c, and not in (w̲,r), then a ZL HDS based database reveals absolutely nothing about that piece.^{3}
We will focus in particular on schemes whose first stage has the ZL property for each feature separately: I(S _{ i };W _{ i })=0. If the transform in Fig. 1 yields independent features, then automatically I(S _{ j };W _{ i })=0 for all i,j, and the whole first stage has the ZL property.
1.6 Contributions and organization of this paper

We show that the ZL constraint for continuous helper data necessitates the existence of “Sibling Points”, points x that correspond to different s but give rise to the same helper data w.

We prove that the ZL constraint for \(x\in \mathbb R\) implies “quantile” helper data. This holds for uniformly distributed s as well as for nonuniform s. Thus, we identify a simple quantile construction as being the generic ZL scheme for all HDS types, including the FE and SS as special cases. It turns out that the continuum limit of a FE scheme of Verbitskiy et al. [7] precisely corresponds to our quantile HDS.

We derive a reconstruction algorithm for the quantile ZL FE that minimizes the reconstruction errors. It amounts to using a set of optimized threshold values, and is very suitable for lowfootprint implementation.

We analyze, in an allGaussian example, the performance (in terms of reconstruction error rate) of our ZL FE combined with the optimal reconstruction algorithm. We compare this scheme to fixed quantization and a likelihoodbased classifier. It turns out that our error rate is better than that of fixed quantization, and not much worse than that of the likelihoodbased classifier.
The organization of this paper is as follows. Section 2 discusses quantization techniques. After some preliminaries (Section 3), the sibling points and the quantile helper data are treated in Section 4. Section 5 discusses the optimal reconstruction thresholds. The performance analysis in the Gaussian model is presented in Section 6.
2 Related work on biometric quantization
2.1 Fixed quantization (FQ)
The simplest form of quantization applies a uniform, fixed quantization grid during both enrollment and verification. An example for N=4 quantization regions is depicted in Fig. 2a. An unfavorably located genuine user pdf, near a quantization boundary, can cause a high reconstruction error.
The inherently large error probability can be mitigated by “reliable component” selection [17]. Only components x _{ i } far away from a boundary are selected; the rest are discarded. The indices of the reliable components constitute the helper data. Such a scheme is very inefficient, as it wastes resources: features that are unfavorably located w.r.t. the quantization grid, but nonetheless carry information, are eliminated. Furthermore, the helper data leaks information about the biometric, since the intervals have unequal width and therefore unequal probabilities of producing reliable components [19].
2.2 Quantization index modulation (QIM)
QIM borrows principles from digital watermarking [20] and writing on dirty paper [21]. QIM has quantization intervals alternatingly labeled with ‘s‘0” and “1” as the values for the secret s. The helper data w is constructed as the distance from x to the middle of a quantization interval; adding w to y then offsets the pdf so that the pdf is centered on the interval (Fig. 2b), yielding a significantly lower reconstruction error probability than FQ.
The freedom to choose quantization step sizes allows for a tradeoff between reconstruction performance and leakage [4]. The alternating labeling was adopted to reduce leakage but sacrifices a large part of the source’s entropy.
2.3 Likelihoodbased quantization (LQ)
At enrollment, the LQ scheme [6] allocates N quantization regions as follows. The first two boundaries are chosen such that they yield the same probability of y given x, and at the same time enclose a probability mass 1/N on the background distribution (the whole population’s distribution). Subsequent quantization intervals are chosen contiguous to the first and again enclose a 1/N probability mass. Finally, the probability mass in the tails of the background distribution is added up as a wraparound interval, which also holds a probability mass of 1/N. Since the quantization boundaries are at fixed probability mass intervals, it suffices to communicate a single boundary t as helper data to the verification phase.
In LQ, the secret s is not equiprobable. The error rates are low, but the revealed t leaks information about s.
2.4 Dynamic detectionratebased bit allocation
In [22], Lim et al. proposed dynamic genuine interval search (DGIS) as an improvement of the bit allocation scheme of Chen et al. [23]. The resulting scheme has some similarity to our approach in that they both determine discretization intervals per user and store these intervals as helper data. However, their scheme is motivated solely by optimization of the detection rate, whereas in our scheme the optimization is subject to the zero leakage restriction. Applying the DGIS method introduces some additional leakage to the underlying bit allocation scheme. Furthermore, DGIS performs its search for the optimal discretization intervals using a sliding window algorithm, which in general will not succeed in finding the exact optimum. In contrast, in our scheme, we analytically derive the optimal solution from the background distribution.
3 Preliminaries
3.1 Notation
Random variables are denoted with capital letters and their realizations in lowercase. The notation \({\mathbb {E}}\) stands for expectation. Sets are written in calligraphic font. We zoom in on the onedimensional firststage HDS in Fig. 1. For brevity of notation the index i∈{1,…,M} on x _{ i },w _{ i },s _{ i },y _{ i } and \(\hat {s}_{i}\) will be omitted.
3.2 Zero leakage
We will work with a definition of the zeroleakage property that is a bit stricter than the usual formulation [7], which pertains to mutual information. This is necessary in order to avoid problems caused by the fact that W is a continuum variable (e.g., pathological cases where some property does not hold on measurezero subsets of \(\mathcal {W}\)),
Definition 3.1.
In words, we define the ZL property as independence between S and W. Knowledge about W has no effect on the adversary’s uncertainty about S. ZL implies I(S;W)=0 or, equivalently, H(SW)=H(S). Here H stands for Shannon entropy, and I for mutual information (see, e.g., ([24], Eq. (2.35)–(2.39)).
3.3 Noise model
It is common to assume a noise model in which the enrollment measurement x and verification measurement y are both derived from a hidden ‘true’ biometric value z, i.e., X=Z+N _{e} and Y=Z+N _{v}, where N _{e} stands for the noise in the enrollment measurement and N _{v} for the noise in the verification measurement. It is assumed that N _{e} and N _{v} are mutually independent and independent of X and Y. The N _{e},N _{v} have zero mean and variance \(\sigma _{\mathrm {e}}^{2},\sigma _{\mathrm {v}}^{2}\) respectively. The variance of z is denoted as \({\sigma _{Z}^{2}}\). This is a very generic model. It allows for various special cases such as noiseless enrollment, equal noise at enrollment, and verification, etc.
It is readily seen that the variance of X and Y is given by \({\sigma _{X}^{2}}={\sigma _{Z}^{2}}+\sigma _{\mathrm {e}}^{2}\) and \({\sigma _{Y}^{2}}={\sigma _{Z}^{2}}+\sigma _{\mathrm {v}}^{2}\). The correlation coefficient ρ between X and Y is defined as \(\rho =({\mathbb {E}}[XY]{\mathbb {E}}[X]{\mathbb {E}}[Y])/(\sigma _{X} \sigma _{Y})\) and it can be expressed as \(\rho ={\sigma _{Z}^{2}}/(\sigma _{X} \sigma _{Y})\).
where R is zeromean noise. This way of expressing Y is motivated by the first and second order statistics, i.e., the variance of Y is \(\lambda ^{2} {\sigma _{X}^{2}}+\sigma ^{2}={\sigma _{Y}^{2}}\), and the correlation between X and Y is \({\mathbb {E}}[XY]/(\sigma _{X}\sigma _{Y})=\lambda {\sigma _{X}^{2}}/(\sigma _{X}\sigma _{Y})=\rho \).
In the case of Gaussian Z,N _{e},N _{v}, the X and Y are Gaussian, and the noise R is Gaussian as well.
From (7), it follows that the PDF of y given x (i.e., the noise between enrollment and verification) is centered on λ x and has variance σ ^{2}. The parameter λ is called the attenuation parameter. In the “identical conditions” case σ _{e}=σ _{v} it holds that \(\lambda =\rho ={\sigma _{Z}^{2}}/\left ({\sigma _{Z}^{2}}+\sigma _{\mathrm {v}}^{2}\right)\). In the “noiseless enrollment” case σ _{e}=0 we have λ=1 and \(\rho =\sigma _{Z}/\sqrt {{\sigma _{Z}^{2}}+\sigma _{\mathrm {v}}^{2}}\).
We will adopt expression (7) as our noise model.
In Section 5.1, we will be considering a class of noise distributions that we call symmetric fading noise.
Definition 3.2.
Equation (8) reflects the property that small noise excursions are more likely than large ones, and that the sign of the noise is equally likely to be positive or negative. Gaussian noise is an example of symmetric fading noise.
4 Zero leakage: quantile helper data
In Section 4.1, we present a chain of arguments from which we conclude that, for ZL helper data, it is sufficient to consider only functions g with the following properties: (1) covering \(\mathcal {W}\) on each quantization interval (surjective); (2) monotonically increasing on each quantization interval. This is then used in Section 4.2 to derive the main result, Theorem 4.8: Zero Leakage is equivalent to having helper data obeying a specific quantile rule. This rule makes it possible to construct a very simple ZL HDS which is entirely generic.
4.1 Why it is sufficient to consider monotonically increasing surjective functions g
The reasoning in this section is as follows. We define sibling points as points x in different quantization intervals but with equal w. We first show that for every w, there must be at least one sibling point in each interval (surjectivity); then, we demonstrate that having more than one is bad for the reconstruction error rate. This establishes that each interval must contain exactly one sibling point for each w. Then, we show that the ordering of sibling points must be the same in each interval, because otherwise the error rate increases. Finally, assuming g to be differentiable yields the monotonicity property.
The verifier has to reconstruct x based on y and w. In general this is done by first identifying which points \(x\in \mathbb R\) are compatible with w, and then selecting which one is most likely, given y and w. For the first step, we introduce the concept of sibling points.
Definition 4.1.
(Sibling points): Two points \(x,x'\in \mathbb {R}\) , with x≠x ^{′} , are called Sibling Points if g(x)=g(x ^{′}).
The verifier determines a set \({\mathcal {X}}_{w}=\{x\in \mathbb {R} g(x)=w\}\) of sibling points that correspond to helper data value w. We write \({\mathcal {X}}_{w}=\cup _{s\in {\mathcal {S}}}{\mathcal {X}}_{sw}\), with \({\mathcal {X}}_{sw}=\{x\in \mathbb {R} Q(x)=s\wedge g(x)=w\}\). We derive a number of requirements on the sets \({\mathcal {X}}_{sw}\).
Lemma 4.2.
Proof: see Appendix A.1 Proof of Lemma 4.2. Lemma 4.2 tells us that there is significant leakage if there is not at least one sibling point compatible with w in each interval A _{ s }, for all \(w\in \mathcal {W}\). Since we are interested in zero leakage, we will from this point onward consider only functions g such that \({\mathcal {X}}_{sw}\neq \emptyset \) for all s,w.
Next, we look at the requirement of low reconstruction error probability. We focus on the minimum distance between sibling points that belong to different quantization intervals.
Definition 4.3.
We take the approach of maximizing D _{min}. It is intuitively clear that such an approach yields low error rates given the noise model introduced in Section 3.3. The following lemma gives a constraint that improves the D _{min}.
Lemma 4.4.
Let \(w\in \mathcal {W}\) and \({\mathcal {X}}_{sw}\neq \emptyset \) for all \(s\in \mathcal {S}\) . The D _{min}(w)is maximized by setting \({\mathcal {X}}_{sw}= 1\) for all \(s\in \mathcal {S}\).
Proof: see Appendix A.2 Proof of Lemma 4.4. Lemma 4.4 states that each quantization interval A _{ s } should contain exactly one point x compatible with w. From here onward we will only consider functions g with this property.
The set \({\mathcal {X}}_{sw}\) consists of a single point which we will denote as x _{ sw }. Note that g is then an invertible function on each interval A _{ s }. For given \(w\in \mathcal {W}\), we now have a set \({\mathcal {X}}_{w}=\cup _{s\in \mathcal {S}}x_{sw}\) that consists of one sibling point per quantization interval. This vastly simplifies the analysis. Our next step is to put further constraints on g.
Lemma 4.5.
 1.
g(x _{3})=w _{1}; g(x _{4})=w _{2}
 2.
g(x _{4})=w _{1}; g(x _{3})=w _{2}.
Proof: see Appendix A.3 Proof of Lemma 4.5. Lemma 4.5 tells us that the ordering of sibling points should be the same in each quantization interval, for otherwise the overall minimum distance D _{min} suffers. If, for some s, a point x with helper data w _{2} is higher than a point with helper data w _{1}, then this order has to be the same for all intervals.
The combination of having a preserved order (Lemma 4.5) together with g being invertible on each interval (Lemma 4.4) points us in the direction of “smooth” functions. If g is piecewise differentiable, then we can formulate a simple constraint as follows.
Theorem 4.6.
(sign of g ^{′} equal on each A _{ s }):Let x _{ s }∈A _{ s },x _{ t }∈A _{ t } be sibling points as defined in Def. 4.1 . Let g be differentiable in x _{ s } and x _{ t } . Then having sign g ^{′}(x _{ s })=sign g ^{′}(x _{ t })leads to a higher D _{min} than sign g ^{′}(x _{ s })≠sign g ^{′}(x _{ t }).
Proof: see Appendix A.4 Proof of Theorem 4.5.
If we consider a function g that is differentiable on each quantization interval, then (1) its piecewise invertibility implies that it has to be either monotonously increasing or monotonously decreasing on each interval, and (2) Theorem 4.5 then implies that it has to be either increasing on all intervals or decreasing on all intervals.
Of course there is no reason to assume that g is piecewise differentiable. For instance, take a piecewise differentiable g and apply a permutation to the waxis. This procedure yields a function g _{2} which, in terms of error probabilities, has exactly the same performance as g, but is not differentiable (nor even continuous). Thus, there exist huge equivalence classes of helper data generating functions that satisfy invertibility (Lemma 4.4) and proper ordering (Lemma 4.5). This brings us to the following conjecture, which allows us to concentrate on functions that are easy to analyze.
Conjecture 4.7.
Without loss of generality we can choose the function g to be differentiable on each quantization interval \(A_{s},s\in \mathcal {S}\).
Based on Conjecture 4.7, we will consider only functions g that are monotonically increasing on each interval. This assumption is in line with all (first stage) HDSs [4, 6, 8] known to us.
4.2 Quantile helper data
We state our main result in the theorem below.
Theorem 4.8.
Proof: see Appendix A.5 Proof of Theorem 4.8.
Corollary 4.9.
Proof.
Immediately follows by combining Eq. (13) with the fact that \(p_{s}=1/N\;\forall s\in \mathcal {S}\) in a FE scheme, and with the FE quantization boundaries given in Eq. (5).
Equation (16) coincides with the continuum limit of the Fuzzy extractor construction by Verbitskiy et al. [7]. A similar equation was later independently proposed for uniform key generation from a noisy channel by Ye et al. [25]. Equation (15) is the simplest way to implement an enrollment that satisfies the sibling point relation of Theorem 4.8. However, it is not the only way. For instance, by applying any invertible function to w, a new helper data scheme is obtained that also satisfies the sibling point relation (13) and hence is ZL. Another example is to store the whole set of sibling points \(\{x_{tw}\}_{t\in \mathcal {S}}\); this contains exactly the same information as w. The transformed scheme can be seen as merely a different representation of the “basic” ZL HDS (15). Such a representation may have various advantages over (15), e.g., allowing for a faster reconstruction procedure, while being completely equivalent in terms of the ZL property. We will see such a case in Section 5.3.
5 Optimal reconstruction
5.1 Maximum likelihood and thresholds
The goal of the HDS reconstruction algorithm Rep(y,w) is to reliably reproduce the secret s. The best way to achieve this is to choose the most probable \(\hat {s}\) given y and w, i.e., a maximum likelihood algorithm. We derive optimal decision intervals for the reconstruction phase in a Zero Leakage Fuzzy Extractor.
Lemma 5.1.
Proof: see Appendix A.6 Proof of Lemma 5.1. To simplify the verification phase we can identify thresholds τ _{ s } that denote the lower boundary of a decision region. If τ _{ s }≤y<τ _{ s+1}, we reconstruct \(\hat {s}=s\). The τ _{0}=−∞ and τ _{ N }=∞ are fixed, which implies we have to find optimal values only for the N−1 variables τ _{1},…,τ _{ N−1} as a function of w.
Theorem 5.2.
Proof.
Since \(g_{s}^{1}(w)\neq g_{s1}^{1}(w)\) the only viable solution is Eq. (19).
Instead of storing the ZL helper data w according to (15), one can also store the set of thresholds τ _{1},…,τ _{ N−1}. This contains precisely the same information, and allows for quicker reconstruction of s: just a thresholding operation on y and the τ _{ s } values, which can be implemented on computationally limited devices.
5.2 Special case: 1bit secret
In the case of a onebit secret s, i.e., N=2, the above ZL FE scheme is reduced to storing a single threshold τ _{1}.
It is interesting and somewhat counterintuitive that this yields a threshold for verification that does not leak information about the secret. In case the average of X is zero, one might assume that a positive threshold value implies s=0. However, both s=0 and s=1 allow positive as well as negative τ _{1}, dependent on the relative location of x in the quantization interval.
5.3 FE: equivalent choices for the quantization
Let us reconsider the quantization function Q(x) in the case of a Fuzzy extractor. Let us fix N and take the g(x) as specified in Eq. (16). Then, it is possible to find an infinite number of different functions Q that will conserve the ZL property and lead to exactly the same error rate as the original scheme. This is seen as follows. For any w∈[0,1), there is an Ntuplet of sibling points. Without any impact on the reconstruction performance, we can permute the svalues of these points; the error rate of the reconstruction procedure depends only on the xvalues of the sibling points, not on the slabel they carry. It is allowed to do this permutation for every w independently, resulting in an infinite equivalence class of Qfunctions. The choice we made in Section 3 yields the simplest function in an equivalence class.
6 Example: Gaussian features and BCH codes
To benchmark the reproduction performance of our scheme, we give an example based on Gaussiandistributed variables. In this example, we will assume all variables to be Gaussian distributed, though we remind the reader that our scheme specifies optimal reconstruction thresholds even for nonGaussian distributions.
A comparison with QIM cannot be made since there the probability for an impostor to guess the enrolled secret cannot be made equal to 1/N. This would result in an unfair comparison since the other schemes are designed to possess this property. Moreover, the QIM scheme allows the reproduction error probability to be made arbitrary small by increasing the quantization width at the cost of leakage.
Also, the likelihood based classification can be tuned by setting the decision threshold. However, for this scheme, it is possible to choose a threshold such that an impostor will have a probability of 1/N to be accepted, which corresponds to the 1/N probability of guessing the enrolled secret in a FE scheme. Note that for a likelihood classifier, there is no enrolled secret since this is not a quantization scheme.
Finally, we consider the vector case of the two quantization schemes discussed above. We concluded that FQ has a larger error probability, but we now show how this relates to either false rejection or secret length when combined with a code offset method [3].
We assume i.i.d. features and therefore we can calculate false acceptance rate (FAR) and false rejection rate (FRR) based on a binomial distribution. In practice, features can be made (nearly) independent, but they will in general not be identically distributed. However, results will be similar. Furthermore we assume the error correcting code can be applied such that its error correcting properties can be fully exploited. This implies that we have to use a Gray code to label the extracted secrets before concatenation.
We used 64 i.i.d. features, each having a SNR of 17 dB, which is a typical average value for biometric features [8, 17]. From these features, we extract 2 bits per feature on which we apply BCH codes with a code length of 127. (We omit one bit). For analysis, we have also included the code (127,127,0), which is not an actual code, but represents the case in which no error correction is applied.
7 Conclusions
In this paper, we have studied a generic helper data scheme (HDS) which comprises the Fuzzy extractor (FE) and the secure sketch (SS) as special cases. In particular, we have looked at the zero leakage (ZL) property of HDSs in the case of a onedimensional continuous source X and continuous helper data W.
We make minimal assumptions, justified by Conjecture 4.7: we consider only monotonic g(x). We have shown that the ZL property implies the existence of sibling points \(\{x_{sw}\}_{s\in \mathcal {S}}\) for every w. These are values of x that have the same helper data w. Furthermore, the ZL requirement is equivalent to a quantile relationship (Theorem 4.8) between the sibling points. This directly leads to Eq. (15) for computing w from x. (Applying any reversible function to this w yields a completely equivalent helper data system.) The special case of a FE (p _{ s }=1/N) yields the m→∞ limit of the Verbitskiy et al. [7] construction.
We have derived reconstruction thresholds τ _{ s } for a ZL FE that minimize the error rate in the reconstruction of s (Theorem 5.2). This result holds under very mild assumptions on the noise: symmetric and fading. Equation (19) contains the attenuation parameter λ, which follows from the noise model as specified in Section 3.3.
Finally, we have analyzed reproduction performance in an allGaussian example. Fixed quantization struggles with inherent high error probability, while the ZL FE with optimal reproduction follows the performance of the optimal classification algorithm. This results in a larger key size in the protected template compared to the fixed quantization scheme, since an ECC with a larger message length can be applied in the second stage HDS to achieve the same FRR.
In this paper, we have focused on arbitrary but known probability densities. Experiments with real data are beyond the scope of this paper, but have been reported in [26, 27]. A key finding there was that modeling the distributions can be problematic, especially due to statistical outliers. Even so, improvements were obtained with respect to earlier ZL schemes. We see modeling refinements as a topic for future research.
8 Endnotes
^{1} For informationtheoretic concepts such as Shannon entropy and mutual information we refer to e.g. [24].
^{2} This concept is not new. Achieving zero mutual information has always been a (sometimes achievable) desideratum in the literature on fuzzy vaults/fuzzy extractors/secure sketches for discrete and continuous sources.
^{3} An overall ZeroLeakage scheme can be obtained in the final HDS stage even from a leaky HDS by applying privacy amplification as a postprocessing step. However, this procedure discards substantial amounts of source entropy, while in many practical applications it is already a challenge to achieve reasonable security levels from biometrics without privacy protection.
9 Appendix
10 Appendix A: Proofs
10.1 A.1 Proof of Lemma 4.2
Pick any \(w\in \mathcal {W}\). The statement \(w\in {\mathcal {W}}\) means that there exists at least one \(s'\in \mathcal {S}\) such that \({\mathcal {X}}_{s'w}\neq \emptyset \). Now suppose there exists some \(s'' \in \mathcal {S}\) with \({\mathcal {X}}_{s''w}=\emptyset \). Then knowledge of w reveals information about S, i.e. \({\mathbb {P}}[S=sW=w]\neq {\mathbb {P}}[S=s]\), which contradicts ZL.
10.2 A.2 Proof of Lemma 4.4
The D _{min}(w) for g _{2} cannot be smaller than D _{min}(w) for g.
10.3 A.3 Proof of Lemma 4.5
We tabulate the D _{min}(w) values for case 1 and 2,
The smallest of these distances is x _{3}−x _{2}.
10.4 A.4 Proof of Theorem 4.6
We use the fact that g(x _{ s })=g(x _{ t }), and that ε and δ are positive. Taking the sign of both sides of (24) and neglecting second order contributions, we get sign g ^{′}(x _{ s })=sign g ^{′}(x _{ t }).
10.5 A.5 Proof of Theorem 4.8
The result (13) follows by integration, using the fact that A _{ s } has lower boundary q _{ s }.
10.6 A.6 Proof of Lemma 5.1
We constructed the scheme to be a FE with ZL, and therefore p _{ s }=1/N and f _{ WS }(ws)=f _{ W }(w). We see that both p _{ s } and f _{ WS }(ws) do not depend on s, which implies they can be omitted from Eq. (30), yielding \(\text {Rep}({y,w})=\mathop {\arg \max }_{s\in \mathcal {S}}f_{Y{S,W}}(y{s,w})\). Finally, knowing S and W is equivalent to knowing X. Hence f _{ YS,W }(ys,w) can be replaced by f _{ YX }(yx) with x satisfying Q(x)=s and g(x)=w. The unique x value that satisfies these constraints is \(g_{s}^{1}(w)\).
Declarations
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Authors’ Affiliations
References
 T van der Putte, J Keuning, in Proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications on Smart Card Research and Advanced Applications. Biometrical fingerprint recognition: don’t get your fingers burned (Kluwer Academic PublishersNorwell, MA, USA, 2001), pp. 289–303.Google Scholar
 T Matsumoto, H Matsumoto, K Yamada, S Hoshino, Impact of artificial “gummy” fingers on fingerprint systems. Opt. Secur. Counterfeit Deterrence Tech.4677:, 275–289 (2002).Google Scholar
 A Juels, M Wattenberg, in CCS ’99: Proceedings of the 6th ACM Conf on Comp and Comm Security. A fuzzy commitment scheme (ACMNew York, NY, USA, 1999), pp. 28–36, doi:10.1145/319709.31971410.1145/319709.319714. http://doi.acm.org/10.1145/319709.319714.View ArticleGoogle Scholar
 JP Linnartz, P Tuyls, in New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates, ed. by J Kittler, Mark Nixon. Audio and VideoBased Biometric Person Authentication: 4th International Conference, AVBPA 2003 Guildford, UK, June 9–11, 2003 Proceedings (Springer Berlin HeidelbergBerlin, Heidelberg, 2003), pp. 393–402, doi:10.1007/354044887X_47. http://dx.doi.org/10.1007/354044887X_47.Google Scholar
 P Tuyls, B Škorić, T Kevenaar, Security with Noisy Data: Private Biometrics, Secure Key Storage and AntiCounterfeiting (Springer, Secaucus, NJ, USA, 2007).View ArticleMATHGoogle Scholar
 C Chen, RNJ Veldhuis, TAM Kevenaar, AHM Akkermans, in Proc. IEEE Int. Conf. on Biometrics: Theory, Applications, and Systems. Multibits biometric string generation based on the likelihood ratio (IEEEPiscataway, 2007).Google Scholar
 EA Verbitskiy, P Tuyls, C Obi, B Schoenmakers, B Škorić, Key extraction from general nondiscrete signals. Inform. Forensics Secur. IEEE Trans.5(2), 269–279 (2010).View ArticleGoogle Scholar
 JA de Groot, JPMG Linnartz, in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process. Zero leakage quantization scheme for biometric verification (Piscataway, 2011).Google Scholar
 Y Dodis, L Reyzin, A Smith, in Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, ed. by C Cachin, JL Camenisch. Advances in Cryptology  EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 26, 2004. Proceedings (Springer Berlin HeidelbergBerlin, Heidelberg, 2004), pp. 523–540, doi:10.1007/9783540246763_31. http://dx.doi.org/10.1007/9783540246763_31.Google Scholar
 AV Herrewege, S Katzenbeisser, R Maes, R Peeters, AR Sadeghi, I Verbauwhede, C Wachsmann, in Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUFEnabled RFIDs, ed. by AD Keromytis. Financial Cryptography and Data Security: 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27March 2, 2012, Revised Selected Papers (Springer Berlin HeidelbergBerlin, Heidelberg, 2012), pp. 374–389, doi:10.1007/9783642329463_27. http://dx.doi.org/10.1007/9783642329463_27.Google Scholar
 B Škorić, N de Vreede, The spammed code offset method. IEEE Trans. Inform. Forensics Secur.9(5), 875–884 (2014).View ArticleGoogle Scholar
 F MacWilliams, N Sloane, The Theory of Error Correcting Codes (Elsevier, Amsterdam, 1978).MATHGoogle Scholar
 JL Wayman, AK Jain, D Maltoni, D Maio (eds.), Biometric Systems: Technology, Design and Performance Evaluation, 1st edn. (Spring Verlag, London, 2005).Google Scholar
 B Škorić, P Tuyls, W Ophey, in Robust Key Extraction from Physical Uncloneable Functions, ed. by J Ioannidis, A Keromytis, and M Yung. Applied Cryptography and Network Security: Third International Conference, ACNS 2005, New York, NY, USA, June 710, 2005. Proceedings (Springer Berlin HeidelbergBerlin, Heidelberg, 2005), pp. 407–422, doi:10.1007/11496137_28. http://dx.doi.org/10.1007/11496137_28.Google Scholar
 GE Suh, S Devadas, in Proceedings of the 44th Annual Design Automation Conference. DAC ’07. Physical unclonable functions for device authentication and secret key generation (ACMNew York, NY, USA, 2007), pp. 9–14.Google Scholar
 DE Holcomb, WP Burleson, K Fu, PowerUp SRAM state as an identifying fingerprint and source of true random numbers. Comput. IEEE Trans.58(9), 1198–1210 (2009).MathSciNetView ArticleGoogle Scholar
 P Tuyls, A Akkermans, T Kevenaar, GJ Schrijen, A Bazen, R Veldhuis, in Practical Biometric Authentication with Template Protection, ed. by T Kanade, A Jain, and N Ratha. Audio and VideoBased Biometric Person Authentication: 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, USA, July 2022, 2005. Proceedings (Springer Berlin HeidelbergBerlin, Heidelberg, 2005), pp. 436–446, doi:10.1007/11527923_45. http://dx.doi.org/10.1007/11527923_45Google Scholar
 EJC Kelkboom, GG Molina, J Breebaart, RNJ Veldhuis, TAM Kevenaar, W Jonker, Binary biometrics: an analytic framework to estimate the performance curves under gaussian assumption. Syst. Man Cybernetics, Part A: Syst. Hum. IEEE Trans.40(3), 555–571 (2010). doi:10.1109/TSMCA.2010.2041657.View ArticleGoogle Scholar
 EJC Kelkboom, KTJ de Groot, C Chen, J Breebaart, RNJ Veldhuis, in Biometrics: Theory, Applications, and Systems, 2009. BTAS ’09. IEEE 3rd International Conference On. Pitfall of the detection rate optimized bit allocation within template protection and a remedy, (2009), pp. 1–8, doi:10.1109/BTAS.2009.5339046.
 B Chen, GW Wornell, Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. Inform. Theory IEEE Trans.47(4), 1423–1443 (2001). doi:10.1109/18.923725.MathSciNetView ArticleMATHGoogle Scholar
 MHM Costa, Writing on dirty paper (corresp.)IEEE Trans. Inform. Theory. 29(3), 439–441 (1983).MathSciNetView ArticleMATHGoogle Scholar
 MH Lim, ABJ Teoh, KA Toh, Dynamic detectionratebased bit allocation with genuine interval concealment for binary biometric representation. IEEE Trans. Cybernet., 843–857 (2013).Google Scholar
 C Chen, RNJ Veldhuis, TAM Kevenaar, AHM Akkermans, Biometric quantization through detection rate optimized bit allocation. EURASIP J. Adv. Signal Process.2009:, 29–12916 (2009). doi:10.1155/2009/784834.MATHGoogle Scholar
 TM Cover, JA Thomas, Elements of Information Theory, 2nd edn. (John Wiley & Sons, Inc., 2005).Google Scholar
 C Ye, S Mathur, A Reznik, Y Shah, W Trappe, NB Mandayam, Informationtheoretically secret key generation for fading wireless channels. IEEE Trans. Inform. Forensics Secur.5(2), 240–254 (2010).View ArticleGoogle Scholar
 JA de Groot, JPMG Linnartz, in Proc. WIC Symposium on Information Theory in the Benelux. Improved privacy protection in authentication by fingerprints (WICThe Netherlands, 2011).Google Scholar
 JA de Groot, B Škorić, N de Vreede, JPMG Linnartz, in Security and Cryptography (SECRYPT), 2013 International Conference On. Diagnostic category leakage in helper data schemes for biometric authentication (IEEEPiscataway, 2013), pp. 1–6.Google Scholar