A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.'s Construction
[chapter]
2018
Lecture Notes in Computer Science
In this paper, modifying this reusable FE, we propose a new FE with size-reduced helper data hiring a threshold scheme. ...
After the concept of a Fuzzy Extractor (FE) was first introduced by Dodis et al. , it has been regarded as one of the candidate solutions for key management utilizing biometric data. ...
's reusable fuzzy extractor as a C++ program. ...
doi:10.1007/978-3-319-93638-3_3
fatcat:4up27ifhafbwpcpjn4tlwp7b5m
An Improved Fuzzy Vector Signature with Reusability
2020
Applied Sciences
In this paper, we propose an improved FVS scheme which is proven to be reusable with respect to arbitrary correlated fuzzy (biometric) inputs. ...
of a single user, which are all generated with correlated fuzzy (biometric) data, are exposed to the adversary. ...
In order for a reusable fuzzy extractor to be widely used in practice, it should be able to tolerate more than a certain level of errors inherent in fuzzy (biometric) data. ...
doi:10.3390/app10207141
fatcat:bxe3k53mdvhlfekaphswaff4ni
Error Correction in the Bounded Storage Model
[chapter]
2005
Lecture Notes in Computer Science
In particular, we show that any local fuzzy extractor yields a secure and error-resilient cryptosystem in the model, in analogy to the result of Lu (JoC, 2004) that any local strong extractor yields a ...
In this paper, we provide a general paradigm for constructing secure and error-resilient private-key cryptosystems in the bounded storage model that tolerate a constant fraction of errors, and attain the ...
Acknowledgment I thank Michael Rabin and Salil Vadhan for numerous insightful discussions on the bounded storage model, in particular the one that brought up the issue of error correction. ...
doi:10.1007/978-3-540-30576-7_31
fatcat:uziixtzpmfhfbihz3nnomzwzd4
Building Secure SRAM PUF Key Generators on Resource Constrained Devices
[article]
2019
arXiv
pre-print
A fuzzy extractor can turn noisy PUF responses into usable cryptographic keys. ...
However, a fuzzy extractor is not immediately mountable on (highly) resource constrained devices due to its implementation overhead. ...
., -2O-VN, that offer reusability should be chosen for the reverse fuzzy extractor.
VI. ...
arXiv:1902.03031v1
fatcat:5oxvoi4qindbxj2bsm5s74s6fi
Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience
[chapter]
2018
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Biometric-based remote user authentication is a useful primitive that allows an authorized user to authenticate to a remote server using his biometrics. ...
To address these issues, we propose a novel leakage-resilient and privacy-preserving biometric-based remote user authentication framework, such that registered users securely and privately authenticate ...
[8] , most constructions of fuzzy extractor are not reusable (except [5, 8] ), and adding error-correcting codes to a strong extractor with hard-to-invert auxiliary inputs at the fuzzy case (i.e., when ...
doi:10.1007/978-3-030-01701-9_7
fatcat:c4pqjrv4hrdd5gwuzdzi7mvl7i
Reusable cryptographic fuzzy extractors
2004
Proceedings of the 11th ACM conference on Computer and communications security - CCS '04
We show that a number of recent definitions and constructions of fuzzy extractors are not adequate for multiple uses of the same fuzzy secret-a major shortcoming in the case of biometric applications. ...
As an illustration, we demonstrate how to use a biometric secret in a remote error tolerant authentication protocol that does not require any storage on the client's side. ...
"Zero Storage" Remote Biometric Authentication To demonstrate the power of the reusable fuzzy extractor machinery, we briefly present a remote biometric authentication protocol with third party certification ...
doi:10.1145/1030083.1030096
dblp:conf/ccs/Boyen04
fatcat:24mmg6dvenbcbmt4kskomwgzpm
Construction of a New Biometric-Based Key Derivation Function and Its Application
2018
Security and Communication Networks
The fuzzy extractor is known as a prominent biometric cryptosystem. ...
However, the fuzzy extractor has a drawback in that a user is required to store user-specific helper data or receive it online from the server with additional trusted channel, to derive a correct key. ...
Over a decade later, in 2016, a reusable fuzzy extractor was proposed with no limitation on the number of correlated readings of the source [15] . ...
doi:10.1155/2018/6107912
fatcat:p7shvzft4jb7rjfgyeoffffkoi
Robust Fuzzy Extractors and Authenticated Key Agreement From Close Secrets
2012
IEEE Transactions on Information Theory
W = W and the goal is to transform a nonuniform shared secret to a uniform one), or "fuzzy extraction." ...
The former has applications to, e.g., biometric authentication, while the latter arises in, e.g., the bounded-storage model with errors. ...
bounded-storage model (BSM) with errors. ...
doi:10.1109/tit.2012.2200290
fatcat:c7ayvs2h5fbmbmd2h6ag2arhbe
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
[chapter]
2006
Lecture Notes in Computer Science
W = W and the goal is to transform a nonuniform shared secret to a uniform one), or "fuzzy extraction." ...
The former has applications to, e.g., biometric authentication, while the latter arises in, e.g., the bounded-storage model with errors. ...
bounded-storage model (BSM) with errors. ...
doi:10.1007/11818175_14
fatcat:ub5t3izmcvemrljhw37uwgmudy
Lightweight (Reverse) Fuzzy Extractor With Multiple Reference PUF Responses
2019
IEEE Transactions on Information Forensics and Security
One primary PUF application is the secure derivation of volatile cryptographic keys using a fuzzy extractor comprising of two procedures: i) secure sketch; and ii) entropy extraction. ...
A Physical unclonable functions (PUF), alike a fingerprint, exploits manufacturing randomness to endow each physical item with a unique identifier. ...
Nevertheless, a reverse fuzzy extractor with MRR is naturally compatible with debiasing schemes that offer reusability. ...
doi:10.1109/tifs.2018.2886624
fatcat:k4fiob4ipvhrlggua4eetzigx4
Fuzzy Extractors for Biometric Identification
2017
2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)
The proposed protocol is able to identify a user with constant computational cost rather than linear-time computation required by other fuzzy extractor schemes. ...
The proposed protocol is able to identify a user with constant computational cost rather than linear-time computation required by other fuzzy extractor schemes. ...
Generally speaking, a fuzzy extractor can be derived by using a secure sketch with a strong randomness extractor. ...
doi:10.1109/icdcs.2017.107
dblp:conf/icdcs/LiGMSN17
fatcat:fuwhncndqvdgzg6ueptdax7yl4
Efficient Fuzzy Extraction Of Puf-Induced Secrets: Theory And Applications
2016
Zenodo
Fuzzy extractors transform this noisy non-uniformly distributed secret into a stable high-entropy key. ...
As such, we debunk the reusability claim of the reverse fuzzy extractor. Moreover, we provide proper quantitative motivation for debiasing schemes, as this was missing in the original proposals. ...
A Fundamental Security Flaw in Reverse Fuzzy Extractors The reverse fuzzy extractor, as proposed by Van Herrewege et al. ...
doi:10.5281/zenodo.55449
fatcat:472252ayczdsnnzo3zjk2edg7i
Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications
[chapter]
2016
Lecture Notes in Computer Science
Fuzzy extractors transform this noisy non-uniformly distributed secret into a stable high-entropy key. ...
As such, we debunk the reusability claim of the reverse fuzzy extractor. Moreover, we provide proper quantitative motivation for debiasing schemes, as this was missing in the original proposals. ...
The implementation footprint of a practical fuzzy extractor, using the (n − k)
bound and the BoundWorstCase algorithm respectively. ...
doi:10.1007/978-3-662-53140-2_20
fatcat:famnb652sreyld2sbg77x5sicy
SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices
[article]
2019
arXiv
pre-print
The design of SecuCode: i) overcomes the resource-constrained and intermittently powered nature of the CRFID devices; ii) is fully compatible with existing communication protocols employed by CRFID devices ...
Function (SRAM PUF) to a firmware update protocol. ...
Specifically, S ←MAC(m, sk) computes a MAC from a message m-to prevent replay attacks, a nonce can be concatenated with the message-and a key sk. • Fuzzy Extractor A fuzzy extractor FE is defined by two ...
arXiv:1807.10463v3
fatcat:moig5tynmbecvo63ihhpkedjca
MLP based Reusability Assessment Automation Model for Java based Software Systems
2014
International Journal of Modern Education and Computer Science
The presented model follows a reusability metric framework that targets the requisite reusability attributes including maintainability (using the Maintainability Index) for functional analysis of the components ...
The results generated using JRA 2 M 2 indicate that the proposed automation tool can be effectively used as a reliable and efficient solution for automated evaluation of reusability. ...
[19] also propose an approach that uses a hybrid of Neuro fuzzy and genetic algorithm for identifying reusable software components at the functional level with the help of the CB metric suite. ...
doi:10.5815/ijmecs.2014.08.06
fatcat:y5bexrv2inhwnk2dh6nvakxlo4
« Previous
Showing results 1 — 15 out of 260 results