Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data

From MaRDI portal
Publication:3614152

DOI10.1137/060651380zbMath1165.94326arXivcs/0602007OpenAlexW2146813141MaRDI QIDQ3614152

No author found.

Publication date: 16 March 2009

Published in: SIAM Journal on Computing (Search for Journal in Brave)

Full work available at URL: https://arxiv.org/abs/cs/0602007




Related Items (only showing first 100 items - show all)

Attribute-Based Keyword Search from LatticesMemory leakage-resilient secret sharing schemesRecovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of ACNS 2015 and 2016A Practical Leakage-Resilient Signature Scheme in the Generic Group ModelPrivacy with Imperfect RandomnessSecure Computation from Leaky Correlated RandomnessReproducible Circularly-Secure Bit Encryption: Applications and RealizationsLeakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation AuthorityBeyond the Csiszár-Körner bound: best-possible wiretap coding via obfuscationFine-grained verifier NIZK and its applicationsShort leakage resilient and non-malleable secret sharing schemesFully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile CommunicationsNearly optimal property preserving hashingFuzzy authenticated key exchange with tight securityLeakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from latticesIBE with incompressible master secret and small identity secretsRate-1 incompressible encryption from standard assumptionsSpeak much, remember little: cryptography in the bounded storage model, revisitedLattice signature with efficient protocols, application to anonymous credentialsExtractors: low entropy requirements colliding with non-malleabilityParadigms for Unconditional Pseudorandom GeneratorsBeyond the Csiszár-Korner bound: best-possible wiretap coding via obfuscationLockable obfuscation from circularly insecure fully homomorphic encryptionUnnamed ItemNonmalleable digital lockers and robust fuzzy extractors in the plain modelLattice-based programmable hash functions and applicationsAlmost tight multi-user security under adaptive corruptions from LWE in the standard modelHardness of (M)LWE with semi-uniform seedsPassword Mistyping in Two-Factor-Authenticated Key ExchangeUnnamed ItemNonmalleable Extractors and Codes, with Their Many Tampered ExtensionsAn Improved Robust Fuzzy ExtractorOn an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy CodesКритерии секретности ключаPreserving Randomness for Adaptive AlgorithmsLeakage-Resilient Revocable Identity-Based Signature with Cloud Revocation AuthorityFully Leakage-Resilient CodesUnconditional UC-Secure Computation with (Stronger-Malicious) PUFsPrivacy amplification with asymptotically optimal entropy lossOn Notions of Security for Deterministic Encryption, and Efficient Constructions without Random OraclesUnnamed ItemContinuously non-malleable codes with split-state refreshUnnamed ItemFour-state non-malleable codes with explicit constant rateOn the Foundations of Quantitative Information FlowKey Agreement from Close Secrets over Unsecured ChannelsUnnamed ItemSeparating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors AssumptionNon-malleable functions and their applicationsImproved computational extractors and their applicationsAdaptive extractors and their application to leakage resilient secret sharingRobustly reusable fuzzy extractor with imperfect randomnessHalftimeHash: modern hashing without 64-bit multipliers or finite fieldsProvable time-memory trade-offs: symmetric cryptography against memory-bounded adversariesCondensed UnpredictabilitySecure computation using leaky correlations (asymptotically optimal constructions)Two-message statistically sender-private OT from LWEHow to Compute in the Presence of LeakageLWE without modular reduction and improved side-channel attacks against BLISSTargeted lossy functions and applicationsLeakage-resilient cryptography from minimal assumptionsLeakage Resilient One-Way Functions: The Auxiliary-Input SettingOblivious Transfer from Any Non-trivial Elastic Noisy Channel via Secret Key AgreementRegular lossy functions and their applications in leakage-resilient cryptographyAdaptive-secure identity-based inner-product functional encryption and its leakage-resilienceLocal Correlation Breakers and Applications to Three-Source Extractors and MergersA counterexample to the chain rule for conditional HILL entropyFully leakage-resilient signaturesEfficient Code Based Hybrid and Deterministic Encryptions in the Standard ModelPublic key encryption resilient to leakage and tampering attacksAsymptotically quasi-optimal cryptographyAuthentication in the bounded storage modelSecure non-interactive simulation: feasibility and rateFeasibility and infeasibility of secure computation with malicious PUFsObfuscated fuzzy Hamming distance and conjunctions from subset product problemsContinuously non-malleable secret sharing for general access structuresPrivacy amplification from non-malleable codesDeciding unique decodability of bigram counts via finite automataLeakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairingReflection Cryptanalysis of PRINCE-Like CiphersAuthentication in Constrained SettingsUnifying Leakage Classes: Simulatable Leakage and PseudoentropyMetric Pseudoentropy: Characterizations, Transformations and ApplicationsThe Chaining Lemma and Its ApplicationInformation Theoretic Security for Encryption Based on Conditional Rényi EntropiesModulus Computational EntropyMulti-key Homomorphic AuthenticatorsA Practical Fuzzy Extractor for Continuous FeaturesA Better Chain Rule for HILL Pseudoentropy - Beyond Bounded LeakageUpdatable Lossy Trapdoor Functions and Its Application in Continuous LeakageComputational fuzzy extractor from LWEWhen Are Fuzzy Extractors Possible?Efficient Public-Key Cryptography with Bounded Leakage and Tamper ResiliencePublic-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary FunctionsReproducible circularly secure bit encryption: applications and realizationsAccess control encryption with efficient verifiable sanitized decryptionLattice-based e-cash, revisitedQuasi chain rule for min-entropyAlgebraic manipulation detection codesReflections on the security proofs of Boneh-Franklin identity-based encryption scheme




This page was built for publication: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data