Robustly reusable fuzzy extractor from standard assumptions
From MaRDI portal
Recommendations
Cites work
- A computational introduction to number theory and algebra
- Advances in Cryptology - EUROCRYPT 2004
- An Improved Robust Fuzzy Extractor
- Circular chosen-ciphertext security with compact ciphertexts
- Computational fuzzy extractors
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
- Efficient, reusable fuzzy extractors from LWE
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Handbook of Face Recognition
- Non-malleable extractors and symmetric key cryptography from weak secrets
- Quantum information and computation
- Reusable fuzzy extractor from LWE
- Reusable fuzzy extractor from the decisional Diffie-Hellman assumption
- Reusable fuzzy extractors for low-entropy distributions
- Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
- Robustly reusable fuzzy extractor from standard assumptions
- Secure Remote Authentication Using Biometric Data
Cited in
(18)- Robustly reusable fuzzy extractor with imperfect randomness
- Impossibility of efficient information-theoretic fuzzy extraction
- Robustly reusable fuzzy extractor from standard assumptions
- Reusable fuzzy extractor from the decisional Diffie-Hellman assumption
- Robustly reusable fuzzy extractor from isogeny
- LWE without modular reduction and improved side-channel attacks against BLISS
- Efficient, reusable fuzzy extractors from LWE
- Fuzzy authenticated key exchange with tight security
- Nonmalleable digital lockers and robust fuzzy extractors in the plain model
- Generic constructions of robustly reusable fuzzy extractor
- Robustly reusable fuzzy extractors in a post-quantum world
- A reusable fuzzy extractor with practical storage size: modifying Canetti et al.'s construction
- When Are Fuzzy Extractors Possible?
- Secure Sketch and Fuzzy Extractor with Imperfect Randomness: An Information-Theoretic Study
- Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy
- Non-malleable fuzzy extractors
- Upgrading fuzzy extractors
- X-lock: a secure XOR-based fuzzy extractor for resource constrained devices
This page was built for publication: Robustly reusable fuzzy extractor from standard assumptions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1710686)