When Are Fuzzy Extractors Possible?
From MaRDI portal
Publication:2958123
DOI10.1007/978-3-662-53887-6_10zbMath1404.94072OpenAlexW2181993045MaRDI QIDQ2958123
No author found.
Publication date: 1 February 2017
Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53887-6_10
information theoryerror-correcting codesbiometric authenticationerror-tolerancekey derivationfuzzy extractorssecure sketches
Related Items (4)
Obfuscated fuzzy Hamming distance and conjunctions from subset product problems ⋮ Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy ⋮ Computational fuzzy extractors ⋮ Reusable fuzzy extractors for low-entropy distributions
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Secure computation without authentication
- A short proof for a theorem of Harper about Hamming-spheres
- Universal classes of hash functions
- Randomness is linear in space
- Computational Fuzzy Extractors
- On Virtual Grey Box Obfuscation for General Circuits
- Biometric Security from an Information-Theoretical Perspective
- Secret Key Agreement: General Capacity and Second-Order Asymptotics
- Converses For Secret Key Agreement and Secure Computing
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Privacy Amplification by Public Discussion
- The Wire-Tap Channel
- Broadcast channels with confidential messages
- Secret key agreement by public discussion from common information
- Common randomness in information theory and cryptography. I. Secret sharing
- Password hardening based on keystroke dynamics
- Advances in Cryptology - EUROCRYPT 2004
- Probability Inequalities for Sums of Bounded Random Variables
- Secure Remote Authentication Using Biometric Data
- One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption
- Simple and Tight Bounds for Information Reconciliation and Privacy Amplification
- Optimal numberings and isoperimetric problems on graphs
This page was built for publication: When Are Fuzzy Extractors Possible?