搜索结果: 1-9 共查到“军事学 extractor”相关记录9条 . 查询时间(0.054 秒)
A Quantum-Proof Non-Malleable Extractor With Application to Privacy Amplification against Active Quantum Adversaries
Privacy Amplification Non-malleable extractors Quantum Cryptography
2019/3/1
privacy amplification, two mutually trusted parties aim to amplify the secrecy of an initial shared secret X in order to establish a shared private key K by exchanging messages over an insecure commun...
Robustly reusable Fuzzy Extractor (rrFE) considers reusability and robustness simultaneously. We present two approaches to the generic construction of rrFE. Both of approaches make use of a secure ske...
Robustly Reusable Fuzzy Extractor from Standard Assumptions
Fuzzy extractor Reusability Robustness Standard assumptions
2018/11/19
A fuzzy extractor (FE) aims at deriving and reproducing (almost) uniform cryptographic keys from noisy non-uniform sources. To reproduce an identical key R from subsequent readings of a noisy source, ...
A Reusable Fuzzy Extractor with Practical Storage Size
threshold cryptography key management secret sharing
2018/7/17
After the concept of a Fuzzy Extractor (FE) was rst introduced by Dodis et al. , it has been regarded as one of the candidate solutions for key management utilizing biometric data. With a noisy input...
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol
distance-bounding terrorist-fraud anonymous authentication
2017/4/11
Distance-bounding protocols have been introduced to thwart relay attacks against contactless authentication protocols. In this context, verifiers have to authenticate the credentials of untrusted prov...
Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT
Computational fuzzy extractor Learning with errors Authentication system
2016/12/8
With the advent of the Internet of Things, lightweight devices necessitate secure and cost-efficient key storage. Since traditional secure storage is expensive, the valuable entropy could originate fr...
We present a generic method to secure various widely-used cryptosystems against \emph{arbitrary} side-channel leakage, as long as the leakage adheres three restrictions: first, it is bounded per obser...
A fuzzy extractor is a security primitive that allows
for reproducible extraction of an almost uniform key from a noisy
non-uniform source. We analyze a fuzzy extractor scheme that
uses universal h...
An Improved Robust Fuzzy Extractor
Robust Fuzzy Extractor post-application robust biometric authentication
2009/6/5
We consider the problem of building robust fuzzy extractors, which allow two parties holding
similar random variablesW, W0 to agree on a secret key R in the presence of an active adversary.
Robust f...