|
Volumn , Issue , 2004, Pages 82-91
|
Reusable cryptographic fuzzy extractors
|
Author keywords
Chosen perturbation security; Error tolerant cryptography; Fuzzy extractor; Zero storage remote biometric authentication
|
Indexed keywords
ALGORITHMS;
COMPUTER CRIME;
COMPUTER SOFTWARE;
ERROR ANALYSIS;
INFORMATION THEORY;
MATHEMATICAL MODELS;
PERTURBATION TECHNIQUES;
PUBLIC KEY CRYPTOGRAPHY;
SECURITY OF DATA;
CHOSEN PERTUBATION SECURITY;
ERROR TOLERANT CRYPTOGRAPHY;
FUZZY EXTRACTOR;
ZERO STORAGE REMOTE BIOMETRIC AUTHENTICATION;
FUZZY SETS;
|
EID: 14844335721
PISSN: 15437221
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1145/1030083.1030096 Document Type: Conference Paper |
Times cited : (296)
|
References (15)
|