搜索结果: 1-6 共查到“军事学 Fuzzy Extractor”相关记录6条 . 查询时间(0.078 秒)
Generic Constructions of Robustly Reusable Fuzzy Extractor
rrFE AIAE
font style='font-size:12px;'>
2019/1/9
Robustly reusable Fuzzy Extractor (rrFE) considers reusability and robustness simultaneously. We present two approaches to the generic construction of rrFE. Both of approaches make use of a secure ske...
Robustly Reusable Fuzzy Extractor from Standard Assumptions
Fuzzy extractor Reusability Robustness Standard assumptions
font style='font-size:12px;'>
2018/11/19
A fuzzy extractor (FE) aims at deriving and reproducing (almost) uniform cryptographic keys from noisy non-uniform sources. To reproduce an identical key R from subsequent readings of a noisy source, ...
A Reusable Fuzzy Extractor with Practical Storage Size
threshold cryptography key management secret sharing
font style='font-size:12px;'>
2018/7/17
After the concept of a Fuzzy Extractor (FE) was rst introduced by Dodis et al. , it has been regarded as one of the candidate solutions for key management utilizing biometric data. With a noisy input...
Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT
Computational fuzzy extractor Learning with errors Authentication system
font style='font-size:12px;'>
2016/12/8
With the advent of the Internet of Things, lightweight devices necessitate secure and cost-efficient key storage. Since traditional secure storage is expensive, the valuable entropy could originate fr...
An efficient fuzzy extractor for limited noise
fuzzy extractor limited noise
font style='font-size:12px;'>
2009/6/11
A fuzzy extractor is a security primitive that allows
for reproducible extraction of an almost uniform key from a noisy
non-uniform source. We analyze a fuzzy extractor scheme that
uses universal h...
An Improved Robust Fuzzy Extractor
Robust Fuzzy Extractor post-application robust biometric authentication
font style='font-size:12px;'>
2009/6/5
We consider the problem of building robust fuzzy extractors, which allow two parties holding
similar random variablesW, W0 to agree on a secret key R in the presence of an active adversary.
Robust f...