搜索结果: 1-15 共查到“军事学 Fuzzy”相关记录46条 . 查询时间(0.085 秒)
Lattice-Based Remote User Authentication from Reusable Fuzzy Signature
Lattice-Based Cryptography Fuzzy Signatures Biometrics Reusability
2019/6/26
In this paper, we introduce a new construction of lattice-based reusable fuzzy signature for remote user authentication that is secure against quantum computers. We define formal security models for t...
Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems
Program Obfuscation Hamming Distance Conjunctions
2019/6/4
We consider the problem of obfuscating programs for fuzzy matching (in other words, testing whether the Hamming distance between an nn-bit input and a fixed nn-bit target vector is smaller than some p...
We introduce and study the notion of keyless fuzzy search (KlFS) which allows to mask a publicly available database in such a way that any third party can retrieve content if and only if it possesses ...
Robustly reusable Fuzzy Extractor (rrFE) considers reusability and robustness simultaneously. We present two approaches to the generic construction of rrFE. Both of approaches make use of a secure ske...
Robustly Reusable Fuzzy Extractor from Standard Assumptions
Fuzzy extractor Reusability Robustness Standard assumptions
2018/11/19
A fuzzy extractor (FE) aims at deriving and reproducing (almost) uniform cryptographic keys from noisy non-uniform sources. To reproduce an identical key R from subsequent readings of a noisy source, ...
A Reusable Fuzzy Extractor with Practical Storage Size
threshold cryptography key management secret sharing
2018/7/17
After the concept of a Fuzzy Extractor (FE) was rst introduced by Dodis et al. , it has been regarded as one of the candidate solutions for key management utilizing biometric data. With a noisy input...
When are Continuous-Source Fuzzy Extractors Possible?
fuzzy extractors secure sketches information-theory
2018/5/22
Fuzzy extractors (Dodis et al., Eurocrypt 2004) convert repeated noisy readings of a high-entropy source into the same uniformly distributed key. The ideal functionality of a fuzzy extractor outputs t...
Signature Schemes with a Fuzzy Private Key
Fuzzy Signature Public Biometric Infrastructure
2017/12/13
In this paper, we introduce a new concept of digital signature that we call \emph{fuzzy signature}, which is a signature scheme that uses a noisy string such as biometric data as a private key, but \e...
Consider key agreement by two parties who start out knowing a common secret (which we refer to as “pass-string”, a generalization of “password”), but face two complications: (1) the pass-string may co...
A fuzzy extractor (FE), proposed for deriving cryptographic keys from biometric data, enables reproducible generation of high-quality randomness from noisy inputs having sufficient min-entropy. FEs re...
Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory vs Practice
Fuzzy Extractor Physical Unclonable Functions Implementation Attacks
2017/6/2
Fuzzy extractors have been proposed in 2004 by Dodis et al. as a secure way to generate cryptographic keys from noisy sources. Originally, biometrics were the main motivation for fuzzy extractors but ...
Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT
Computational fuzzy extractor Learning with errors Authentication system
2016/12/8
With the advent of the Internet of Things, lightweight devices necessitate secure and cost-efficient key storage. Since traditional secure storage is expensive, the valuable entropy could originate fr...
Practical Reusable Fuzzy Extractors for the Set Difference Metric and Adaptive Fuzzy Extractors
fuzzy extractors reusability adaptive fuzzy extractors
2016/12/7
A Fuzzy Extractor (Dodis et al., Eurocrypt 2004) is a two-step protocol that turns a noisy secret into a uniformly distributed key R. To eliminate noise, the generation procedure takes as inputs an en...
Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing
Hierarchical Identity-Based Broadcast Encryption Adaptive Security Chosen-ciphertext Security
2016/6/22
With the advances of cloud computing, data sharing becomes easier for large-scale enterprises. When deploying privacy and security schemes in data sharing systems, fuzzy-entity data sharing, entity ma...
Efficient Fuzzy Search on Encrypted Data
Searchable encryption symmetric encryption fuzzy search
2016/1/23
We study the problem of efficient (sub-linear) fuzzy search on encrypted outsourced data, in the symmetric-key setting. In particular, a user who stores encrypted data on a remote untrusted server f...