Impossibility of efficient information-theoretic fuzzy extraction
From MaRDI portal
Publication:6564092
DOI10.1007/S10623-024-01376-ZMaRDI QIDQ6564092FDOQ6564092
Authors: Benjamin Fuller
Publication date: 28 June 2024
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Coding theorems (Shannon theory) (94A24) Cryptography (94A60) Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science) (68P30) Privacy of data (68P27)
Cites Work
- A Pseudorandom Generator from any One-way Function
- Privacy Amplification by Public Discussion
- Optimal numberings and isoperimetric problems on graphs
- Title not available (Why is that?)
- Randomness is linear in space
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Some notions of entropy for cryptography. (Invited talk)
- Secret key agreement by public discussion from common information
- Separating succinct non-interactive arguments from all falsifiable assumptions
- Simple and Tight Bounds for Information Reconciliation and Privacy Amplification
- Obfuscation for evasive functions
- Robustly reusable fuzzy extractor from standard assumptions
- Obfuscated fuzzy Hamming distance and conjunctions from subset product problems
- Generic constructions of robustly reusable fuzzy extractor
- Efficient, reusable fuzzy extractors from LWE
- Advances in cryptology -- ASIACRYPT '96. International conference on the theory and applications of cryptology and information security, Kyongju, Korea, November 3--7, 1996. Proceedings
- Secret Key Agreement: General Capacity and Second-Order Asymptotics
- A new distribution-sensitive secure sketch and popularity-proportional hashing
- On virtual grey box obfuscation for general circuits
- Reusable fuzzy extractors for low-entropy distributions
- Computational fuzzy extractors
- When Are Fuzzy Extractors Possible?
- When Are Fuzzy Extractors Possible?
- Universal Multiparty Data Exchange and Secret Key Agreement
- Interactive Communication for Data Exchange
This page was built for publication: Impossibility of efficient information-theoretic fuzzy extraction
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6564092)