2020
DOI: 10.1016/j.ic.2020.104602
|View full text |Cite
|
Sign up to set email alerts
|

Computational fuzzy extractors

Abstract: Fuzzy extractors derive strong keys from noisy sources. Their security is usually defined informationtheoretically, with gaps between known negative results, existential constructions, and polynomial-time constructions. We ask whether using computational security can close these gaps. We show the following: • Negative Result: Noise tolerance in fuzzy extractors is usually achieved using an information reconciliation component called a secure sketch. We show that secure sketches are subject to upper bounds from… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(2 citation statements)
references
References 46 publications
0
2
0
Order By: Relevance
“…While this entropy level is not sufficient for the existence of information theoretically secure fuzzy extractors for Hamming distance [28], computational constructions exist based on plausible computational hardness assumptions (see e.g. [27,32,16,2,42]). The resulting LSE security inherits the corresponding agreement/entropy parameters and computational assumption of the underlying fuzzy extractor.…”
Section: Building Sublinear Lsementioning
confidence: 99%
“…While this entropy level is not sufficient for the existence of information theoretically secure fuzzy extractors for Hamming distance [28], computational constructions exist based on plausible computational hardness assumptions (see e.g. [27,32,16,2,42]). The resulting LSE security inherits the corresponding agreement/entropy parameters and computational assumption of the underlying fuzzy extractor.…”
Section: Building Sublinear Lsementioning
confidence: 99%
“…In 2020, Fuller et al [25] constructed an informationtheoretic computational fuzzy extractor scheme based on Learn with Error. In their construction, the authors modified the helper data of Juels and Wattenberg using Learn with Error.…”
Section: Introductionmentioning
confidence: 99%