메뉴 건너뛰기




Volumn 52, Issue 5, 2006, Pages 2266-2269

A Fuzzy Sketch with trapdoor

Author keywords

Cryptosystem of McEliece; Fuzzy sketch

Indexed keywords

ENCODING (SYMBOLS); ERROR CORRECTION; FUZZY SETS; MATHEMATICAL MODELS; VECTORS;

EID: 33646034883     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2006.872861     Document Type: Article
Times cited : (6)

References (17)
  • 1
    • 0000860767 scopus 로고
    • "Security-related comments regarding McEliece's public-key cryptosystem"
    • C. M. Adams and H. Meijer, "Security-related comments regarding McEliece's public-key cryptosystem," in Proc. Adv. Crypt. - CRYPTO, 1987, pp. 224-228.
    • (1987) Proc. Adv. Crypt. - CRYPTO , pp. 224-228
    • Adams, C.M.1    Meijer, H.2
  • 2
    • 0024627373 scopus 로고
    • "Security-related comments regarding McEliece's public-key cryptosystem"
    • C. M. Adams and H. Meijer, "Security-related comments regarding McEliece's public-key cryptosystem," IEEE Trans. Inf. Theory, vol. 35, pp. 454-455, 1989.
    • (1989) IEEE Trans. Inf. Theory , vol.35 , pp. 454-455
    • Adams, C.M.1    Meijer, H.2
  • 3
  • 5
    • 0031675932 scopus 로고    scopus 로고
    • "A new algorithm for finding minimum-weight words in a linear code: Application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511"
    • A. Canteaut and F. Chabaud, "A new algorithm for finding minimum-weight words in a linear code: Application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511," IEEE Trans. Inf. Theory, vol. 44, pp. 367-378, 1998.
    • (1998) IEEE Trans. Inf. Theory , vol.44 , pp. 367-378
    • Canteaut, A.1    Chabaud, F.2
  • 6
    • 33646061716 scopus 로고    scopus 로고
    • "The wire-tap channel applied to biometrics"
    • Parma, Italy, Oct. 10-13
    • G. Cohen and G. Zémor, "The wire-tap channel applied to biometrics," in Proc. ISITA2004, Parma, Italy, Oct. 10-13, 2004.
    • (2004) Proc. ISITA2004
    • Cohen, G.1    Zémor, G.2
  • 7
    • 5044245853 scopus 로고    scopus 로고
    • "Generalized coset schemes for the wire-tap channel: Application to biometric"
    • Chicago, IL, Jun. 27-Jul. 2
    • G. Cohen and G. Zémor, "Generalized coset schemes for the wire-tap channel: Application to biometric," in Proc. IEEE Int. Symp. Inf. Theory, Chicago, IL, Jun. 27-Jul. 2 2004.
    • (2004) Proc. IEEE Int. Symp. Inf. Theory
    • Cohen, G.1    Zémor, G.2
  • 8
    • 0031651014 scopus 로고    scopus 로고
    • "On enabling secure applications through offline biometric identification"
    • G. Davida, Y. Frankel, and B. Matt, "On enabling secure applications through offline biometric identification," in Proc. IEEE Symp. Sec. Priv., 1998, pp. 148-157.
    • (1998) Proc. IEEE Symp. Sec. Priv. , pp. 148-157
    • Davida, G.1    Frankel, Y.2    Matt, B.3
  • 9
    • 35048865463 scopus 로고    scopus 로고
    • "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data"
    • Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Proc. Adv. Crypt. - EUROCRYPT 2004, pp. 523-540.
    • (2004) Proc. Adv. Crypt. - EUROCRYPT , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 10
    • 0037265447 scopus 로고    scopus 로고
    • "Hardness of approximating the minimum distance of a linear code"
    • I. Dumer, D. Micciancio, and M. Sudan, "Hardness of approximating the minimum distance of a linear code," IEEE Trans. Inf. Theory, vol. 49, pp. 22-37, 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , pp. 22-37
    • Dumer, I.1    Micciancio, D.2    Sudan, M.3
  • 11
    • 0035747783 scopus 로고    scopus 로고
    • "Error-tolerant password recovery"
    • Philadelphia, PA, Nov. 6-8
    • N. Frykholm and A. Juels, "Error-tolerant password recovery" in Proc. ACM Conf. Comput. Commun. Sec., Philadelphia, PA, Nov. 6-8, 2001, pp. 1-9.
    • (2001) Proc. ACM Conf. Comput. Commun. Sec. , pp. 1-9
    • Frykholm, N.1    Juels, A.2
  • 12
    • 0036794609 scopus 로고    scopus 로고
    • "On the complexity of some cryptographic problems based on the general decoding problem"
    • T. Johansson and F. Jönsson, "On the complexity of some cryptographic problems based on the general decoding problem," IEEE Trans. Inf. Theory, vol. 48, pp. 2669-2678, 2002.
    • (2002) IEEE Trans. Inf. Theory , vol.48 , pp. 2669-2678
    • Johansson, T.1    Jönsson, F.2
  • 15
    • 85034651324 scopus 로고
    • "An observation on the security of McEliece's public-key cryptosystem"
    • Davos, Switzerland, May 25-27
    • P. J. Lee and E. F. Brickell, "An observation on the security of McEliece's public-key cryptosystem," in Proc. Adv. Crypt. - EUROCRYPT, Davos, Switzerland, May 25-27, 1988, pp. 275-280.
    • (1988) Proc. Adv. Crypt. - EUROCRYPT , pp. 275-280
    • Lee, P.J.1    Brickell, E.F.2
  • 16
    • 0002448405 scopus 로고
    • "A public-key cryptosystem based on algebraic coding theory"
    • R. J. McEliece, "A public-key cryptosystem based on algebraic coding theory," JPL DSN Progr. Rep., pp. 114-116, 1978.
    • (1978) JPL DSN Progr. Rep. , pp. 114-116
    • McEliece, R.J.1
  • 17
    • 0343079682 scopus 로고
    • "On the McEliece public-key cryptosystem"
    • Santa Barbara, CA, Aug. 21-25
    • J. van Tilburg, "On the McEliece public-key cryptosystem," in Proc. Adv. Crypt. - CRYPTO, Santa Barbara, CA, Aug. 21-25, 1988, pp. 119-131.
    • (1988) Proc. Adv. Crypt. - CRYPTO , pp. 119-131
    • van Tilburg, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.