Fuzzy extractor

Fuzzy extractors convert biometric data into random strings, which makes it possible to apply cryptographic techniques for biometric security. They… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
A Physical unclonable functions (PUF), alike a fingerprint, exploits manufacturing randomness to endow each physical item with a… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 7
Is this relevant?
2015
2015
The biometrics-based authentication schemes are more security and reliable than the traditional authentication schemes, and it is… (More)
  • table 1
  • figure 1
  • figure 2
  • table 2
  • table 3
Is this relevant?
2014
2014
Following the wide use of smart devices, biometric cryptosystem is used to protect users' privacy data. However, biometric… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2013
2013
Fuzzy extractors derive strong keys from noisy sources. Their security is defined information-theoretically, which limits the… (More)
  • figure 1
Is this relevant?
2012
2012
Bio-cryptography is a new security technology which combines cryptography with biometrics. Fuzzy extractors are effective in… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
2011
2011
Encryption and authentication schemes suffice for the security of information stored or exchanged by different parties, but… (More)
  • figure 1
Is this relevant?
2009
2009
Cryptography traditionally relies on uniformly distributed and precisely reproducible random strings for its secrets, however, it… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2009
2009
Biometric recognition offers a reliable and natural solution to the problem of user authentication by means of her physical and… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2008
2008
We consider the problem of building robust fuzzy extractors, which allow two parties holding similar random variables W , W ′ to… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
  • Xavier Boyen
  • ACM Conference on Computer and Communications…
  • 2004
We show that a number of recent definitions and constructions of fuzzy extractors are not adequate for multiple uses of the same… (More)
Is this relevant?