Reusable and robust fuzzy extractor for CRS-dependent sources

Y Ma, P Shen, X Tian, K Lv, C Chen - Cybersecurity, 2025 - Springer
Fuzzy extractors allow for the extraction and reproduction of a nearly uniform string from a
noisy and non-uniform source. Reusable and robust fuzzy extractors further require that the …

FiveEyes: Cryptographic Biometric Authentication from the Iris

L Demarest, S Ahmad, S Chen, B Fuller… - Cryptology ePrint …, 2024 - eprint.iacr.org
Despite decades of effort, a stubborn chasm exists between the theory and practice of
device-level biometric authentication. Deployed authentication algorithms rely on data that …