Robust fuzzy extractors and authenticated key agreement from close secrets

Y Dodis, J Katz, L Reyzin, A Smith - … , California, USA, August 20-24, 2006 …, 2006 - Springer
Consider two parties holding correlated random variables W and W′, respectively, that are
within distance t of each other in some metric space. These parties wish to agree on a …

Non-malleable extractors and symmetric key cryptography from weak secrets

Y Dodis, D Wichs - Proceedings of the forty-first annual ACM symposium …, 2009 - dl.acm.org
We study the question of basing symmetric key cryptography on weak secrets. In this setting,
Alice and Bob share an n-bit secret W, which might not be uniformly random, but the …

Robust fuzzy extractors and authenticated key agreement from close secrets

Y Dodis, B Kanukurthi, J Katz… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Consider two parties holding samples from correlated distributions W and W^′,
respectively, where these samples are within distance t of each other in some metric space …

Robustly reusable fuzzy extractor from standard assumptions

Y Wen, S Liu - Advances in Cryptology–ASIACRYPT 2018: 24th …, 2018 - Springer
A fuzzy extractor (FE) aims at deriving and reproducing (almost) uniform cryptographic keys
from noisy non-uniform sources. To reproduce an identical key R from subsequent readings …

Privacy amplification and nonmalleable extractors via character sums

Y Dodis, X Li, TD Wooley, D Zuckerman - SIAM Journal on Computing, 2014 - SIAM
In studying how to communicate over a public channel with an active adversary, Dodis and
Wichs introduced the notion of a nonmalleable extractor. A nonmalleable extractor …

Key agreement from close secrets over unsecured channels

B Kanukurthi, L Reyzin - Annual International Conference on the Theory …, 2009 - Springer
We consider information-theoretic key agreement between two parties sharing somewhat
different versions of a secret w that has relatively little entropy. Such key agreement, also …

Robust fuzzy extractors and helper data manipulation attacks revisited: Theory versus practice

GT Becker - IEEE Transactions on Dependable and Secure …, 2017 - ieeexplore.ieee.org
Fuzzy extractors have been proposed in 2004 by Dodis et al. as a secure way to generate
cryptographic keys from noisy sources. In recent years, fuzzy extractors have become an …

Generic constructions of robustly reusable fuzzy extractor

Y Wen, S Liu, D Gu - IACR International Workshop on Public Key …, 2019 - Springer
Abstract Robustly reusable Fuzzy Extractor (rrFE) considers reusability and robustness
simultaneously. We present two approaches to the generic construction of rrFE. Both of …

Facial template protection via lattice-based fuzzy extractors

K Zhang, H Cui, Y Yu - Cryptology ePrint Archive, 2021 - eprint.iacr.org
With the growing adoption of facial recognition worldwide as a popular authentication
method, there is increasing concern about the invasion of personal privacy due to the …

Robustly reusable fuzzy extractor from isogeny

Y Zhou, S Liu, S Han - Theoretical Computer Science, 2024 - Elsevier
Abstract Robustly reusable Fuzzy Extractor (rrFE) allows multiple extractions from the same
fuzzy source in a reproducible way. The reusability of rrFE asks the pseudo-randomness of …