• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 400
Next 10 →

Secure Sketch for Multiple Secrets

by Chengfang Fang, Qiming Li, Ee-chien Chang
"... Abstract. Secure sketches are useful in extending cryptographic schemes to biometric data since they allow recovery of fuzzy secrets under inevitable noise. In practice, secrets derived from biometric data are seldom used alone, but typically employed in a multi-factor or a multimodality setting whe ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract. Secure sketches are useful in extending cryptographic schemes to biometric data since they allow recovery of fuzzy secrets under inevitable noise. In practice, secrets derived from biometric data are seldom used alone, but typically employed in a multi-factor or a multimodality setting

Secure Sketch for Multi-Sets

by Ee-Chien Chang Vadym, Ee-chien Chang, Vadym Fedyukovych, Qiming Li , 2006
"... Given the original set X where |X| = s, a sketch P is computed from X and made public. From another set Y where |Y | = s and P , we can reconstruct X if |X # Y | # |s - t|, where t is some threshold. The sketch P is secure if it does not reveal much information about X. A few constructions have bee ..."
Abstract - Add to MetaCart
Given the original set X where |X| = s, a sketch P is computed from X and made public. From another set Y where |Y | = s and P , we can reconstruct X if |X # Y | # |s - t|, where t is some threshold. The sketch P is secure if it does not reveal much information about X. A few constructions have

Secure sketch for biometric templates

by Qiming Li, Yagiz Sutcu, Nasir Memon - In Asiacrypt , 2006
"... Abstract. There have been active discussions on how to derive a consistent cryptographic key from noisy data such as biometric templates, with the help of some extra information called a sketch. It is desirable that the sketch reveals little information about the biometric templates even in the wors ..."
Abstract - Cited by 29 (3 self) - Add to MetaCart
Abstract. There have been active discussions on how to derive a consistent cryptographic key from noisy data such as biometric templates, with the help of some extra information called a sketch. It is desirable that the sketch reveals little information about the biometric templates even

Identity Leakage Mitigation on Asymmetric Secure Sketch

by Chengfang Fang, Qiming Li, Ee-chien Chang
"... We consider secure sketch construction in an asymmetric setting, that is, multiple samples are acquired during enrollment, but only a single sample is obtained during verification. Known protection methods apply secure sketch constructions on the average of the samples, while publishing the auxiliar ..."
Abstract - Add to MetaCart
We consider secure sketch construction in an asymmetric setting, that is, multiple samples are acquired during enrollment, but only a single sample is obtained during verification. Known protection methods apply secure sketch constructions on the average of the samples, while publishing

1 Analysis of Reusability of Secure Sketches and Fuzzy Extractors

by Marina Blanton, Mehrdad Aliasgari
"... Abstract—Secure sketches and fuzzy extractors enable the use of biometric data in cryptographic applications by correcting errors in noisy biometric readings and producing cryptographic materials suitable for authentication, encryption, and other purposes. Such constructions work by producing a publ ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
Abstract—Secure sketches and fuzzy extractors enable the use of biometric data in cryptographic applications by correcting errors in noisy biometric readings and producing cryptographic materials suitable for authentication, encryption, and other purposes. Such constructions work by producing a

Secure Sketch Metamorphosis: Tight Unified Bounds

by Jeroen Delvaux, Dawu Gu, Ingrid Verbauwhede, Matthias Hiller, El Yu
"... Abstract. A noisy non-uniformly distributed secret often needs to be transformed into a stable high-entropy key. Biometric systems and physi-cally unclonable functions (PUFs) exemplify the need for this conversion. Secure sketches are a useful tool hereby as they alleviate the noisiness while keepin ..."
Abstract - Add to MetaCart
Abstract. A noisy non-uniformly distributed secret often needs to be transformed into a stable high-entropy key. Biometric systems and physi-cally unclonable functions (PUFs) exemplify the need for this conversion. Secure sketches are a useful tool hereby as they alleviate the noisiness while

Small secure sketch for point-set difference

by Ee-Chien Chang, Qiming Li , 2005
"... A secure sketch is a set of published data that can help to recover the original biometric data after they are corrupted by permissible noises, and by itself does not reveal much information about the original. Several constructions have been proposed for different metrics, and in particular, set d ..."
Abstract - Cited by 6 (1 self) - Add to MetaCart
A secure sketch is a set of published data that can help to recover the original biometric data after they are corrupted by permissible noises, and by itself does not reveal much information about the original. Several constructions have been proposed for different metrics, and in particular, set

Efficient Implementation of Set Reconciliation Using BCH-Based Secure Sketches

by Kevin Harmon , 2005
"... Set reconciliation is the problem of efficiently computing the difference be-tween two sets of data held by two different parties. We implement set recon-ciliation using the BCH-based secure sketch for the set-difference metric, as defined in [1], to solve this problem. This method publishes a secur ..."
Abstract - Add to MetaCart
Set reconciliation is the problem of efficiently computing the difference be-tween two sets of data held by two different parties. We implement set recon-ciliation using the BCH-based secure sketch for the set-difference metric, as defined in [1], to solve this problem. This method publishes a

Robust, Short and Sensitive Authentication Tags Using Secure Sketch ABSTRACT

by Qiming Li, Ee-chien Chang
"... In order to apply cryptographic operations on noisy data, a recent approach employs some additional public data, known as secure sketch, to correct the noise so that consistent outcome can be obtained. This approach can be employed to extract authentication tags from noisy multimedia or biometric ob ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
In order to apply cryptographic operations on noisy data, a recent approach employs some additional public data, known as secure sketch, to correct the noise so that consistent outcome can be obtained. This approach can be employed to extract authentication tags from noisy multimedia or biometric

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

by Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, Adam Smith , 2008
"... We provide formal definitions and efficient secure techniques for • turning noisy information into keys usable for any cryptographic application, and, in particular, • reliably and securely authenticating biometric data. Our techniques apply not just to biometric information, but to any keying mater ..."
Abstract - Cited by 535 (38 self) - Add to MetaCart
if the input changes, as long as it remains reasonably close to the original. Thus, R can be used as a key in a cryptographic application. A secure sketch produces public information about its input w that does not reveal w, and yet allows exact recovery of w given another value that is close to w. Thus
Next 10 →
Results 1 - 10 of 400
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University