Fuzzy Signatures: Relaxing Requirements and a New Construction
From MaRDI portal
Publication:2822668
DOI10.1007/978-3-319-39555-5_6zbMath1348.94069OpenAlexW2501397028MaRDI QIDQ2822668
Kenta Takahashi, Goichiro Hanaoka, Takao Murakami, Takahiro Matsuda
Publication date: 4 October 2016
Published in: Applied Cryptography and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-39555-5_6
Related Items (2)
Recovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of ACNS 2015 and 2016 ⋮ A generic construction of fuzzy signature
Cites Work
- Unnamed Item
- A Signature Scheme with a Fuzzy Private Key
- On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks
- Security Proofs for Signature Schemes
- Cryptography Secure against Related-Key Attacks and Tampering
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- A Pseudorandom Generator from any One-way Function
- Efficient Identity-Based Encryption Without Random Oracles
- Outflow boundary conditions for the Fourier transformed one-dimensional Vlasov-Poisson system.
This page was built for publication: Fuzzy Signatures: Relaxing Requirements and a New Construction