An Improved Robust Fuzzy Extractor
From MaRDI portal
Publication:3540042
DOI10.1007/978-3-540-85855-3_11zbMath1180.68150arXiv0807.0799OpenAlexW2099478458MaRDI QIDQ3540042
Leonid Reyzin, Bhavana Kanukurthi
Publication date: 20 November 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/0807.0799
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (6)
Robustly reusable fuzzy extractor with imperfect randomness ⋮ LWE without modular reduction and improved side-channel attacks against BLISS ⋮ Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy ⋮ Robustly reusable fuzzy extractor from standard assumptions ⋮ Key Agreement from Close Secrets over Unsecured Channels ⋮ On Related-Secret Pseudorandomness
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- New hash functions and their use in authentication and set equality
- Universal classes of hash functions
- Randomness is linear in space
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Privacy Amplification by Public Discussion
- The Wire-Tap Channel
- A Pseudorandom Generator from any One-way Function
- Secret-key agreement over unauthenticated public channels-part III: privacy amplification
- Generalized privacy amplification
- Advances in Cryptology - EUROCRYPT 2004
- Secure Remote Authentication Using Biometric Data
- Advances in Cryptology - CRYPTO 2003
- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
- Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
This page was built for publication: An Improved Robust Fuzzy Extractor