Secure sketch conceals any random string w by generating a helper string ss (known as a sketch). It allows the exact recovery of w from ss given another value w' that is close to w. A secure sketch can be utilized to protect any error-prone secret, e.g., biometrics, stored in secret storage to promote secure authentication. When error tolerance is demanded, a secure sketch can be used as an error correction code to tolerate the noise over an unreliable, noisy communication channel. However, when both security and error tolerance are of interest, the error tolerance property of a secure sketch imposes entropy loss. It leads to a weak security guaranty on a low entropy input string. Recent work by Fuller et al. (2016) has exploited the struct...
Fuzzy extractors derive strong keys from noisy sources. Their security is defined information-theore...
AbstractCancelable biometrics and secure sketches have been introduced with the same purpose in mind...
Given the original set X where |X| = s, a sketch P is computed from X and made public. From another ...
Abstract. A noisy non-uniformly distributed secret often needs to be transformed into a stable high-...
Abstract — Secure storage of biometric templates has become an increasingly important issue in biome...
A secure sketch (defined by Dodis et al.) is an algorithm that on an input w produces an output s suc...
Motivated by typo correction in password authentication, we investigate cryptographic error-correcti...
Abstract — Secure storage of biometric templates has become an increasingly important issue in biome...
Abstract. Motivated by the representation of biometric and multime-dia objects, we consider the prob...
Guesswork forms the mathematical framework for quantifying computational security subject to brute-f...
When designing multiple biometric authentication systems, there is tension between minimizing privac...
In this work, we propose methods for speeding up linear regression distributively, while ensuring se...
Guesswork forms the mathematical framework for quantifying computational security subject to brute-f...
© 2017 IEEE. We consider an abstraction of computational security in password protected systems wher...
In 1999, Juels and Wattenberg introduce an effective construction of Fuzzy Sketch, i.e. a way of han...
Fuzzy extractors derive strong keys from noisy sources. Their security is defined information-theore...
AbstractCancelable biometrics and secure sketches have been introduced with the same purpose in mind...
Given the original set X where |X| = s, a sketch P is computed from X and made public. From another ...
Abstract. A noisy non-uniformly distributed secret often needs to be transformed into a stable high-...
Abstract — Secure storage of biometric templates has become an increasingly important issue in biome...
A secure sketch (defined by Dodis et al.) is an algorithm that on an input w produces an output s suc...
Motivated by typo correction in password authentication, we investigate cryptographic error-correcti...
Abstract — Secure storage of biometric templates has become an increasingly important issue in biome...
Abstract. Motivated by the representation of biometric and multime-dia objects, we consider the prob...
Guesswork forms the mathematical framework for quantifying computational security subject to brute-f...
When designing multiple biometric authentication systems, there is tension between minimizing privac...
In this work, we propose methods for speeding up linear regression distributively, while ensuring se...
Guesswork forms the mathematical framework for quantifying computational security subject to brute-f...
© 2017 IEEE. We consider an abstraction of computational security in password protected systems wher...
In 1999, Juels and Wattenberg introduce an effective construction of Fuzzy Sketch, i.e. a way of han...
Fuzzy extractors derive strong keys from noisy sources. Their security is defined information-theore...
AbstractCancelable biometrics and secure sketches have been introduced with the same purpose in mind...
Given the original set X where |X| = s, a sketch P is computed from X and made public. From another ...