2020
DOI: 10.1007/s12652-019-01675-7
|View full text |Cite
|
Sign up to set email alerts
|

LWESM: learning with error based secure communication in mobile devices using fuzzy extractor

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 25 publications
(35 citation statements)
references
References 35 publications
0
34
0
Order By: Relevance
“…The extraction process from the biometric imprint is succinctly defined. A fuzzy extraction ( Fext) process 21,22 is used in this scheme, which is capable of extracting a uniformly chosen random string, using a certain error margin to extract personal information from biometric input. The ( Fext) retrieves the same biometric key information for a noisy biometric using a string in the regeneration technique.…”
Section: Preliminariesmentioning
confidence: 99%
“…The extraction process from the biometric imprint is succinctly defined. A fuzzy extraction ( Fext) process 21,22 is used in this scheme, which is capable of extracting a uniformly chosen random string, using a certain error margin to extract personal information from biometric input. The ( Fext) retrieves the same biometric key information for a noisy biometric using a string in the regeneration technique.…”
Section: Preliminariesmentioning
confidence: 99%
“…Taking inspiration from protocols, 9,11,13 we have applied signal leakage attack on the protocol. 14 The signal leakage attack is possible on the protocol 14 because the server uses a long-term private key. The security of protocol 14 is based on ring learning with errors and decision ring learning with errors assumptions.…”
Section: Our Contributionmentioning
confidence: 99%
“…14 The signal leakage attack is possible on the protocol 14 because the server uses a long-term private key. The security of protocol 14 is based on ring learning with errors and decision ring learning with errors assumptions. In this article, we have illustrated the signal leakage attack and tried to explain how the protocol 14 based on ring learning with errors is vulnerable to signal leakage attack.…”
Section: Our Contributionmentioning
confidence: 99%
“…In scheme (Liu et al 13 ), user needs 4t hs ¼ 0:723856μs, where NCC needs 6t hs ¼ 0:08454μs as computation cost, so total computation cost of this scheme is 0.808396 μs. T A B L E 3 Notations and respective computation cost (Zhang et al, 12 Feng et al, 18 Dharminder et al, 19 and Aguilar-Melchor et al 20 ) Existing protocols for satellite communication networks are mostly based number theoretic problems that are not secure against quantum computer attack due to Shor's algorithm. 2 In this paper, we introduced first learning with error-based key agreement and authentication scheme to improve the security of the satellite communication network and make it ready for the post-quantum world.…”
Section: T a B L E 2 Notations And Respective Discerption Used In Per...mentioning
confidence: 99%