no code implementations • 4 Jul 2008 • Bhavana Kanukurthi, Leonid Reyzin
We consider the problem of building robust fuzzy extractors, which allow two parties holding similar random variables W, W' to agree on a secret key R in the presence of an active adversary.
Cryptography and Security
no code implementations • 4 Feb 2006 • Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, Adam Smith
A "secure sketch" produces public information about its input w that does not reveal w, and yet allows exact recovery of w given another value that is close to w. Thus, it can be used to reliably reproduce error-prone biometric inputs without incurring the security risk inherent in storing them.
Cryptography and Security Information Theory Information Theory