2017
DOI: 10.1007/978-3-319-63697-9_23
|View full text |Cite
|
Sign up to set email alerts
|

A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 22 publications
0
7
0
Order By: Relevance
“…Our FSB protocol uses an estimate of the distribution of human chosen passwords, making it an example of distribution-sensitive cryptography, in which constructions use contextual information about distributions in order to improve security. Previous distribution-sensitive approaches include Woodage et al [48], who introduced a new type of secure sketch [25] for password typos, and Lacharite et al 's [32] frequencysmoothing encryption. While similar in that they use distributional knowledge, their constructions do not apply in our setting.…”
Section: Related Workmentioning
confidence: 99%
“…Our FSB protocol uses an estimate of the distribution of human chosen passwords, making it an example of distribution-sensitive cryptography, in which constructions use contextual information about distributions in order to improve security. Previous distribution-sensitive approaches include Woodage et al [48], who introduced a new type of secure sketch [25] for password typos, and Lacharite et al 's [32] frequencysmoothing encryption. While similar in that they use distributional knowledge, their constructions do not apply in our setting.…”
Section: Related Workmentioning
confidence: 99%
“…Existing secure sketch constructions have shown limitation in providing security for sources with low entropy, i.e., lower than half of its input size. To overcome such limitation, recent approaches [9], [10] suggested to construct a secure sketch where its security property only holds for computationally bounded attacker. Such computational construction relies on fuzzy min-entropy measurement, accompanies with stringent requirement s.t.…”
Section: Discussionmentioning
confidence: 99%
“…∈ W rather than single distribution. Viewed this way, H fuzz t,∞ (W ) measurement is only sufficient for computational secure sketch construction [9], [10], which means that the security property of such construction only hold for computationally bounded attacker (i.e., polynomial time bounded) accompanies with strong assumption on the user has a precise knowledge over W. However, it is unrealistic to assume every sources distribution can be modelled precisely, especially for high entropy sources like human biometric.…”
Section: Issues In Existing Secure Sketch Constructionmentioning
confidence: 99%
“…Using a different approach, Blanchard also proposed a simple theoretical method based on homomorphic encryption that is too computationally expensive to be usable in practice [23]. Finally, Woodage and some of the original authors created a new distribution-sensitive scheme that adjusted the error rate and hashing time, improving the resistance to certain attacks and providing better time/security trade-offs [24].…”
Section: Introductionmentioning
confidence: 99%