An Improved Robust Fuzzy Extractor

被引:0
|
作者
Kanukurthi, Bhavana [1 ]
Reyzin, Leonid [1 ]
机构
[1] Boston Univ Comp Sci, Boston, MA 02215 USA
来源
SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS | 2008年 / 5229卷
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problem of building robust fuzzy extractors, which allow two parties holding similar random variables W, W' to agree on a secret key R in the presence of an active adversary. Robust fuzzy extractors were defined by Dodis et al. in Crypto 2006 to be noninteractive, i.e., only one message P, which can be modified by an unbounded adversary, can pass from one party to the other. This allows them to be used by a single party at different points in time (e.g., for key recovery or biometric authentication), but also presents an additional challenge: what if R is used, and thus possibly observed by the adversary, before the adversary has a chance to modify P. Fuzzy extractors secure against such a strong attack are called post-application robust. We construct a fuzzy extractor with post-application robustness that extracts a shared secret key of up to (2m-n)/2 bits (depending on error-tolerance and security parameters), where n is the bit-length and m is the entropy of W. The previously best known result, also of Dodis et al., extracted up to (2m - n)/3 bits (depending on the same parameters).
引用
收藏
页码:156 / 171
页数:16
相关论文
共 50 条
  • [21] IMPROVED TECHNIQUE FOR THE SOEHENDRA STENT EXTRACTOR
    SILVERMAN, WB
    MARTIN, SP
    DAVIDSON, W
    KAW, M
    HARSHMAN, M
    CARLTON, ME
    GASTROINTESTINAL ENDOSCOPY, 1994, 40 (05) : 653 - 653
  • [22] AN IMPROVED LIQUID-LIQUID EXTRACTOR
    SIMS, RPA
    ADAMS, GA
    JOURNAL OF THE AMERICAN OIL CHEMISTS SOCIETY, 1958, 35 (03) : 139 - 140
  • [23] Improved Robust Fuzzy Twin Support Vector Machine Algorithm
    Zhou, Yuqun
    Zhang, Desheng
    Zhang, Xiao
    Computer Engineering and Applications, 2023, 59 (01) : 140 - 148
  • [24] A fuzzy substroke extractor for handwritten Chinese characters
    Yeung, DS
    Fong, HS
    PATTERN RECOGNITION, 1996, 29 (12) : 1963 - 1980
  • [25] Fuzzy substroke extractor for handwritten Chinese characters
    Hong Kong Polytechnic Univ, Kowloon, Hong Kong
    Pattern Recognit, 12 (1963-1980):
  • [26] Construction and performance of robust fingerprint key extractor
    Li, Ximing
    Yang, Bo
    Zhang, Mingwu
    Yang, Dexin
    Journal of Information and Computational Science, 2010, 7 (06): : 1287 - 1300
  • [27] Robustly reusable fuzzy extractor with imperfect randomness
    Cui, Nan
    Liu, Shengli
    Gu, Dawu
    Weng, Jian
    DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (05) : 1017 - 1059
  • [28] Robustly reusable fuzzy extractor with imperfect randomness
    Nan Cui
    Shengli Liu
    Dawu Gu
    Jian Weng
    Designs, Codes and Cryptography, 2021, 89 : 1017 - 1059
  • [29] Robustly reusable fuzzy extractor from isogeny
    Zhou, Yu
    Liu, Shengli
    Han, Shuai
    THEORETICAL COMPUTER SCIENCE, 2024, 1008
  • [30] Iris authentication scheme based on fuzzy extractor
    State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
    不详
    Jisuanji Yanjiu yu Fazhan, 2008, 6 (1036-1042):