메뉴 건너뛰기




Volumn , Issue , 2004, Pages 82-91

Reusable cryptographic fuzzy extractors

Author keywords

Chosen perturbation security; Error tolerant cryptography; Fuzzy extractor; Zero storage remote biometric authentication

Indexed keywords

ALGORITHMS; COMPUTER CRIME; COMPUTER SOFTWARE; ERROR ANALYSIS; INFORMATION THEORY; MATHEMATICAL MODELS; PERTURBATION TECHNIQUES; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 14844335721     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1030083.1030096     Document Type: Conference Paper
Times cited : (296)

References (15)
  • 3
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • C. Bennett, G. Brassard, and J. Robert. Privacy amplification by public discussion. SIAM J. Computing, 17(2):210-229, 1988.
    • (1988) SIAM J. Computing , vol.17 , Issue.2 , pp. 210-229
    • Bennett, C.1    Brassard, G.2    Robert, J.3
  • 4
    • 84957356475 scopus 로고    scopus 로고
    • Efficient cryptographic protocols based on noisy channels
    • C. Crepeau. Efficient cryptographic protocols based on noisy channels. In Proc. Advances in Cryptology - Eurocrypt '97, pages 306-317, 1997.
    • (1997) Proc. Advances in Cryptology - Eurocrypt '97 , pp. 306-317
    • Crepeau, C.1
  • 5
    • 0031651014 scopus 로고    scopus 로고
    • On enabling secure applications through offline biometric identification
    • G. Davida, Y. Frankel, and B. Matt. On enabling secure applications through offline biometric identification. In Proc. IEEE Symp. Security and Privacy, pages 148-157, 1998.
    • (1998) Proc. IEEE Symp. Security and Privacy , pp. 148-157
    • Davida, G.1    Frankel, Y.2    Matt, B.3
  • 6
    • 17744381820 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Full paper available as: Fuzzy extractors and cryptography, or how to use your fingerprints
    • Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Proc. Advances in Cryptology -Eurocrypt '04, 2004. Full paper available as: Fuzzy extractors and cryptography, or how to use your fingerprints, http://eprint.iacr.org/2003/235.
    • (2004) Proc. Advances in Cryptology -Eurocrypt '04
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 13
    • 0030086632 scopus 로고    scopus 로고
    • Randomness is linear in space
    • N. Nisan and D. Zuckerman. Randomness is linear in space. JCSS, 52(1):43-52, 1996.
    • (1996) JCSS , vol.52 , Issue.1 , pp. 43-52
    • Nisan, N.1    Zuckerman, D.2
  • 15
    • 0012579059 scopus 로고    scopus 로고
    • Recent developments in explicit constructions of extractors
    • R. Shaltiel. Recent developments in explicit constructions of extractors. Bul. EATCS, 77:67-95, 2002.
    • (2002) Bul. EATCS , vol.77 , pp. 67-95
    • Shaltiel, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.