Robustly reusable fuzzy extractor from standard assumptions
From MaRDI portal
Publication:1710686
DOI10.1007/978-3-030-03332-3_17zbMath1447.94058OpenAlexW2900323908MaRDI QIDQ1710686
Publication date: 23 January 2019
Full work available at URL: https://doi.org/10.1007/978-3-030-03332-3_17
Related Items (6)
Robustly reusable fuzzy extractor with imperfect randomness ⋮ LWE without modular reduction and improved side-channel attacks against BLISS ⋮ Fuzzy authenticated key exchange with tight security ⋮ Nonmalleable digital lockers and robust fuzzy extractors in the plain model ⋮ Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy ⋮ Robustly reusable fuzzy extractor from standard assumptions
Cites Work
- Unnamed Item
- Robustly reusable fuzzy extractor from standard assumptions
- Reusable fuzzy extractor from LWE
- Reusable fuzzy extractor from the decisional Diffie-Hellman assumption
- Reusable Fuzzy Extractors for Low-Entropy Distributions
- Computational Fuzzy Extractors
- Handbook of Face Recognition
- An Improved Robust Fuzzy Extractor
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Circular Chosen-Ciphertext Security with Compact Ciphertexts
- Efficient, Reusable Fuzzy Extractors from LWE
- Non-malleable extractors and symmetric key cryptography from weak secrets
- Advances in Cryptology - EUROCRYPT 2004
- Quantum information and computation
- Secure Remote Authentication Using Biometric Data
- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
- Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
This page was built for publication: Robustly reusable fuzzy extractor from standard assumptions