Reusable fuzzy extractor from the decisional Diffie-Hellman assumption

被引:23
|
作者
Wen, Yunhua [1 ,2 ]
Liu, Shengli [1 ,2 ,3 ]
Han, Shuai [1 ,2 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
基金
中国国家自然科学基金;
关键词
Fuzzy extractor; Reusability; Standard model; DDH assumption; PHYSICAL UNCLONABLE FUNCTIONS; PUBLIC-KEY CRYPTOSYSTEM; GENERATE STRONG KEYS; PRIVACY AMPLIFICATION; QUANTUM INFORMATION; NOISY DATA; AUTHENTICATION; IDENTIFICATION; RECOGNITION; BIOMETRICS;
D O I
10.1007/s10623-018-0459-4
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Fuzzy extractors convert noisy non-uniform readings of secret sources into reliably reproducible, uniformly random strings, which in turn are used in cryptographic applications. Reusable fuzzy extractor allows multiple uses of the same secret source. In this paper, we construct the first strongly reusable fuzzy extractor which tolerates linear fraction of errors, with security tightly reduced to the decisional Diffie-Hellman (DDH) assumption in the standard model. Our construction is simple and efficient. Only two group operations and an evaluation of a hash function are added compared with the traditional construction of non-reusable fuzzy extractors.
引用
收藏
页码:2495 / 2512
页数:18
相关论文
共 50 条
  • [1] Reusable fuzzy extractor from the decisional Diffie–Hellman assumption
    Yunhua Wen
    Shengli Liu
    Shuai Han
    [J]. Designs, Codes and Cryptography, 2018, 86 : 2495 - 2512
  • [2] The Kernel Matrix Diffie-Hellman Assumption
    Morillo, Paz
    Rafols, Carla
    Villar, Jorge L.
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 729 - 758
  • [3] The Decision Diffie-Hellman assumption and the Quadratic Residuosity assumption
    Saito, T
    Koshiba, T
    Yamamura, A
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (01): : 165 - 171
  • [4] Decision Diffie-Hellman assumption and the Quadratic Residuosity assumption
    Saito, Taiichi
    Koshiba, Takeshi
    Yamamura, Akihiro
    [J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2001, E84-A (01) : 165 - 171
  • [5] Laconic Branching Programs from the Diffie-Hellman Assumption
    Craig, Sanjam
    Hajiabadi, Mohammad
    Miao, Peihan
    Murphy, Alice
    [J]. PUBLIC-KEY CRYPTOGRAPHY, PT III, PKC 2024, 2024, 14603 : 323 - 355
  • [6] Trapdoor Functions from the Computational Diffie-Hellman Assumption
    Garg, Sanjam
    Hajiabadi, Mohammad
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 362 - 391
  • [7] Identity-based Encryption from the Diffie-Hellman Assumption
    Doettling, Nico
    Garg, Sanjam
    [J]. JOURNAL OF THE ACM, 2021, 68 (03)
  • [8] On Several Verifiable Random Functions and the q-decisional Bilinear Diffie-Hellman Inversion Assumption
    Lauer, Sebastian
    [J]. APKC'18: PROCEEDINGS OF THE 5TH ACM ASIA PUBLIC-KEY CRYPTOGRAPHY WORKSHOP, 2018, : 45 - 51
  • [9] Identity-Based Encryption from the Diffie-Hellman Assumption
    Dottling, Nico
    Garg, Sanjam
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 : 537 - 569
  • [10] Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption
    Yamada, Shota
    Hanaoka, Goichiro
    Kunihiro, Noboru
    [J]. PROVABLE SECURITY, 2010, 6402 : 229 - +