Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Robust fuzzy extractors and authenticated key agreement from close secrets
Consider two parties holding correlated random variables W and W′, respectively, that are
within distance t of each other in some metric space. These parties wish to agree on a …
within distance t of each other in some metric space. These parties wish to agree on a …
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting,
Alice and Bob share an n-bit secret W, which might not be uniformly random, but the …
Alice and Bob share an n-bit secret W, which might not be uniformly random, but the …
Robust fuzzy extractors and authenticated key agreement from close secrets
Consider two parties holding samples from correlated distributions W and W^′,
respectively, where these samples are within distance t of each other in some metric space …
respectively, where these samples are within distance t of each other in some metric space …
Robustly reusable fuzzy extractor from standard assumptions
Y Wen, S Liu - Advances in Cryptology–ASIACRYPT 2018: 24th …, 2018 - Springer
A fuzzy extractor (FE) aims at deriving and reproducing (almost) uniform cryptographic keys
from noisy non-uniform sources. To reproduce an identical key R from subsequent readings …
from noisy non-uniform sources. To reproduce an identical key R from subsequent readings …
Privacy amplification and nonmalleable extractors via character sums
In studying how to communicate over a public channel with an active adversary, Dodis and
Wichs introduced the notion of a nonmalleable extractor. A nonmalleable extractor …
Wichs introduced the notion of a nonmalleable extractor. A nonmalleable extractor …
Key agreement from close secrets over unsecured channels
B Kanukurthi, L Reyzin - Annual International Conference on the Theory …, 2009 - Springer
We consider information-theoretic key agreement between two parties sharing somewhat
different versions of a secret w that has relatively little entropy. Such key agreement, also …
different versions of a secret w that has relatively little entropy. Such key agreement, also …
Robust fuzzy extractors and helper data manipulation attacks revisited: Theory versus practice
GT Becker - IEEE Transactions on Dependable and Secure …, 2017 - ieeexplore.ieee.org
Fuzzy extractors have been proposed in 2004 by Dodis et al. as a secure way to generate
cryptographic keys from noisy sources. In recent years, fuzzy extractors have become an …
cryptographic keys from noisy sources. In recent years, fuzzy extractors have become an …
Generic constructions of robustly reusable fuzzy extractor
Y Wen, S Liu, D Gu - IACR International Workshop on Public Key …, 2019 - Springer
Abstract Robustly reusable Fuzzy Extractor (rrFE) considers reusability and robustness
simultaneously. We present two approaches to the generic construction of rrFE. Both of …
simultaneously. We present two approaches to the generic construction of rrFE. Both of …
Facial template protection via lattice-based fuzzy extractors
With the growing adoption of facial recognition worldwide as a popular authentication
method, there is increasing concern about the invasion of personal privacy due to the …
method, there is increasing concern about the invasion of personal privacy due to the …
Robustly reusable fuzzy extractor from isogeny
Abstract Robustly reusable Fuzzy Extractor (rrFE) allows multiple extractions from the same
fuzzy source in a reproducible way. The reusability of rrFE asks the pseudo-randomness of …
fuzzy source in a reproducible way. The reusability of rrFE asks the pseudo-randomness of …