Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Fuzzy extractor

Fuzzy extractors convert biometric data into random strings, which makes it possible to apply cryptographic techniques for biometric security. They… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
We present a fuzzy extractor whose security can be reduced to the hardness of Learning Parity with Noise (LPN) and can… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
2016
2016
Fuzzy extractors (Dodis et al., Eurocrypt 2004) convert repeated noisy readings of a high-entropy secret into the same uniformly… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2015
Highly Cited
2015
Display Omitted We point out that Yeh et al.'s scheme is not secure because it has several disadvantages in security.We point out… Expand
  • table 1
  • table 2
  • table 3
Is this relevant?
2014
2014
Physical unclonable functions (PUFs) and biometrics are inherently noisy. When used in practice as cryptographic key generators… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Embedded security systems based on Physical Unclonable Functions (PUFs) offer interesting protection properties, such as tamper… Expand
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Physical Unclonable Functions (PUFs) have properties that make them very attractive for a variety of security-related… Expand
  • table 1
  • table 2
  • figure 1
  • table 3
  • figure 2
Is this relevant?
2008
2008
We consider the problem of building robust fuzzy extractors, which allow two parties holding similar random variables W, Wi¾? to… Expand
Is this relevant?
Highly Cited
2007
Highly Cited
2007
We propose an authentication scheme using fingerprint biometrics, protected by a construct called a Fuzzy Extractor. We look at a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We show that a number of recent definitions and constructions of fuzzy extractors are not adequate for multiple uses of the same… Expand
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We provide formal definitions and efficient secure techniques for - turning biometric information into keys usable for any… Expand
  • figure 1
  • table 1
Is this relevant?