2017
DOI: 10.1007/978-3-319-60080-2_1
|View full text |Cite
|
Sign up to set email alerts
|

Efficient, Reusable Fuzzy Extractors from LWE

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 41 publications
(13 citation statements)
references
References 10 publications
0
13
0
Order By: Relevance
“…Recently, several reusable fuzzy extractor schemes have been introduced [32], [34]- [36]. In [34]- [36], the size of the helper data has been reduced compared to [1], but they are not capable of handling the outliers in the user's fuzzy data. In [32], Cheon et al have modified the reusable fuzzy extractor proposed in [1] and reduced the size of helper data by adopting a threshold scheme.…”
Section: Discussionmentioning
confidence: 99%
“…Recently, several reusable fuzzy extractor schemes have been introduced [32], [34]- [36]. In [34]- [36], the size of the helper data has been reduced compared to [1], but they are not capable of handling the outliers in the user's fuzzy data. In [32], Cheon et al have modified the reusable fuzzy extractor proposed in [1] and reduced the size of helper data by adopting a threshold scheme.…”
Section: Discussionmentioning
confidence: 99%
“…Apon et al [ACEK17], Herder et. al [HRvD + 17] and Wen and Liu [WL18] use random linear codes to provide reusability.…”
Section: Subsequent Reusable Fuzzy Extractorsmentioning
confidence: 98%
“…In particular, shift secure constructions tend to consider adaptive security. Shift correlation secure constructions are known from assumptions such as decisional Diffie-Hellman [WLH18] and learning with errors [WL18,ACEK17] while known arbitrary correlation constructions rely on digital lockers.…”
Section: Defining Reusabilitymentioning
confidence: 99%
“…Apon et al [ACEK17] showed that the construction presented in this paper achieves a weak form of reusability if it is modified so that the random code is a global parameter (instead of being created as part of Gen). They also show how to augment the reusability using either a random oracle or LWEbased symmetric encryption techniques.…”
Section: Subsequent Workmentioning
confidence: 99%