Filters








4 Hits in 6.7 sec

A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.'s Construction [chapter]

Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim, Jongchan Lee
2018 Lecture Notes in Computer Science  
In this paper, modifying this reusable FE, we propose a new FE with size-reduced helper data hiring a threshold scheme.  ...  After the concept of a Fuzzy Extractor (FE) was first introduced by Dodis et al. , it has been regarded as one of the candidate solutions for key management utilizing biometric data.  ...  's Reusable Fuzzy Extractor As mentioned before, Canetti et al. proposed a reusable fuzzy extractor using digital lockers and samplethen-lock construction.  ... 
doi:10.1007/978-3-319-93638-3_3 fatcat:4up27ifhafbwpcpjn4tlwp7b5m

An Improved Fuzzy Vector Signature with Reusability

Ilhwan Lim, Minhye Seo, Dong Hoon Lee, Jong Hwan Park
2020 Applied Sciences  
Our efficiency improvement is achieved by strictly applying the subset-based sampling method used before to build a fuzzy extractor by Canetti et al. and by slightly modifying the structure of the verification  ...  Recently, Seo et al. proposed an FVS scheme that was constructed (loosely) using a subset-based sampling method to reduce the size of helper data.  ...  Canetti et al.  ... 
doi:10.3390/app10207141 fatcat:bxe3k53mdvhlfekaphswaff4ni

Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience [chapter]

Yangguang Tian, Yingjiu Li, Rongmao Chen, Nan Li, Ximeng Liu, Bing Chang, Xingjie Yu
2018 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Biometric-based remote user authentication is a useful primitive that allows an authorized user to authenticate to a remote server using his biometrics.  ...  To address these issues, we propose a novel leakage-resilient and privacy-preserving biometric-based remote user authentication framework, such that registered users securely and privately authenticate  ...  Later on, Canetti et al. [8] presented another notion, namely "reusable fuzzy extractor" (the prior work is [5] ).  ... 
doi:10.1007/978-3-030-01701-9_7 fatcat:c4pqjrv4hrdd5gwuzdzi7mvl7i

Security and Privacy Enhanced Gait Authentication with Random Representation Learning and Digital Lockers [article]

Lam Tran, Thuc Nguyen, Hyunil Kim, Deokjai Choi
2021 arXiv   pre-print
The model was evaluated with two benchmark datasets as OU-ISIR and whuGAIT.  ...  First, we propose a revocable and random binary string extraction method using a deep neural network followed by feature-wise binarization.  ...  [34] . 120 Recently, Canetti et al  ... 
arXiv:2108.02400v1 fatcat:hy6h2vyzlzerddonekx3gy4naa