搜索结果: 1-15 共查到“extractors”相关记录35条 . 查询时间(0.102 秒)
Correlated-Source Extractors and Cryptography with Correlated-Random Tapes
Randomness Extractors Non-Malleability
2019/3/4
In this paper, we consider the setting where a party uses correlated random tapes across multiple executions of a cryptographic algorithm. We ask if the security properties could still be preserved in...
Non-Malleable Extractors and Codes for Composition of Tampering, Interleaved Tampering and More
non-malleable codes non-malleable extractors explicit constructions
2018/11/12
Non-malleable codes were introduced by Dziembowski, Pietrzak, and Wichs (JACM 2018) as a generalization of standard error correcting codes to handle severe forms of tampering on codewords. This notion...
When are Continuous-Source Fuzzy Extractors Possible?
fuzzy extractors secure sketches information-theory
2018/5/22
Fuzzy extractors (Dodis et al., Eurocrypt 2004) convert repeated noisy readings of a high-entropy source into the same uniformly distributed key. The ideal functionality of a fuzzy extractor outputs t...
Non-Malleable Extractors and Non-Malleable Codes: Partially Optimal Constructions
non-malleable code privacy amplification non-malleable extractor
2018/4/20
The recent line of study on randomness extractors has been a great success, resulting in exciting new techniques, new connections, and breakthroughs to long standing open problems in several seemingly...
Blockwise p-Tampering Attacks on Cryptographic Primitives, Extractors, and Learners
Tampering Extractors Adversarial Learning
2017/9/28
Austrin, Chung, Mahmoody, Pass and Seth (Crypto'14) studied the notion of bitwise pp-tampering attacks over randomized algorithms in which an efficient `virus' gets to control each bit of the randomne...
A fuzzy extractor (FE), proposed for deriving cryptographic keys from biometric data, enables reproducible generation of high-quality randomness from noisy inputs having sufficient min-entropy. FEs re...
Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory vs Practice
Fuzzy Extractor Physical Unclonable Functions Implementation Attacks
2017/6/2
Fuzzy extractors have been proposed in 2004 by Dodis et al. as a secure way to generate cryptographic keys from noisy sources. Originally, biometrics were the main motivation for fuzzy extractors but ...
Practical Reusable Fuzzy Extractors for the Set Difference Metric and Adaptive Fuzzy Extractors
fuzzy extractors reusability adaptive fuzzy extractors
2016/12/7
A Fuzzy Extractor (Dodis et al., Eurocrypt 2004) is a two-step protocol that turns a noisy secret into a uniformly distributed key R. To eliminate noise, the generation procedure takes as inputs an en...
Non-Malleable Extractors and Codes, with their Many Tampered Extensions
Non-Malleable Extractors Codes
2016/4/7
Randomness extractors and error correcting codes are fundamental objects in computer science. Recently, there have been several natural generalizations of these objects, in the context and study of ta...
Non-Malleable Extractors with Shorter Seeds and Their Applications
extractors non-malleable extractors seed length
2016/1/25
Motivated by the problem of how to communicate over a public channel with an active adversary, Dodis and Wichs (STOC’09) introduced the notion of a non-malleable extractor. A non-malleable extractor n...
Two-sources Randomness Extractors for Elliptic Curves
Elliptic curves randomness extractor key derivation
2016/1/25
This paper studies the task of two-sources randomness extractors for elliptic curves defined over finite fields K, where K can be a prime or a binary field. In fact, we introduce new constructions of ...
Fuzzy extractors (Dodis et al., Eurocrypt 2004) convert repeated noisy readings of a secret into the same uniformly distributed key. To eliminate noise, they require an initial enrollment phase that ...
On the Possibilities and Limitations of Computational Fuzzy Extractors
error-correcting code leakage-resilient cryptography key encapsulation mechanism
2016/1/8
Fuller et al. (Asiacrypt 2013) studied on computational fuzzy extractors, and showed, as a
negative result, that the existence of a computational “secure sketch” implies the existence of an
informat...
Eliminating Leakage in Reverse Fuzzy Extractors
Physically Unclonable Functions Fuzzy Extractors Authentication
2016/1/7
In recent years Physically Unclonable Functions (PUFs) have been proposed as a promising building block for security related scenarios like key storage and authentication. PUFs are physical systems an...
We describe a method of cryptographically-secure key extraction from a noisy biometric source. The computational security of our method can be clearly argued through hardness of Learning Parity With N...