A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.'s Construction
[chapter]
2018
Lecture Notes in Computer Science
In this paper, modifying this reusable FE, we propose a new FE with size-reduced helper data hiring a threshold scheme. ...
After the concept of a Fuzzy Extractor (FE) was first introduced by Dodis et al. , it has been regarded as one of the candidate solutions for key management utilizing biometric data. ...
's Reusable Fuzzy Extractor As mentioned before, Canetti et al. proposed a reusable fuzzy extractor using digital lockers and samplethen-lock construction. ...
doi:10.1007/978-3-319-93638-3_3
fatcat:4up27ifhafbwpcpjn4tlwp7b5m
An Improved Fuzzy Vector Signature with Reusability
2020
Applied Sciences
Our efficiency improvement is achieved by strictly applying the subset-based sampling method used before to build a fuzzy extractor by Canetti et al. and by slightly modifying the structure of the verification ...
Recently, Seo et al. proposed an FVS scheme that was constructed (loosely) using a subset-based sampling method to reduce the size of helper data. ...
Canetti et al. ...
doi:10.3390/app10207141
fatcat:bxe3k53mdvhlfekaphswaff4ni
Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience
[chapter]
2018
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Biometric-based remote user authentication is a useful primitive that allows an authorized user to authenticate to a remote server using his biometrics. ...
To address these issues, we propose a novel leakage-resilient and privacy-preserving biometric-based remote user authentication framework, such that registered users securely and privately authenticate ...
Later on, Canetti et al. [8] presented another notion, namely "reusable fuzzy extractor" (the prior work is [5] ). ...
doi:10.1007/978-3-030-01701-9_7
fatcat:c4pqjrv4hrdd5gwuzdzi7mvl7i
Security and Privacy Enhanced Gait Authentication with Random Representation Learning and Digital Lockers
[article]
2021
arXiv
pre-print
The model was evaluated with two benchmark datasets as OU-ISIR and whuGAIT. ...
First, we propose a revocable and random binary string extraction method using a deep neural network followed by feature-wise binarization. ...
[34] . 120 Recently, Canetti et al ...
arXiv:2108.02400v1
fatcat:hy6h2vyzlzerddonekx3gy4naa