搜索结果: 1-13 共查到“extractor”相关记录13条 . 查询时间(0.062 秒)
A Quantum-Proof Non-Malleable Extractor With Application to Privacy Amplification against Active Quantum Adversaries
Privacy Amplification Non-malleable extractors Quantum Cryptography
2019/3/1
privacy amplification, two mutually trusted parties aim to amplify the secrecy of an initial shared secret X in order to establish a shared private key K by exchanging messages over an insecure commun...
Robustly reusable Fuzzy Extractor (rrFE) considers reusability and robustness simultaneously. We present two approaches to the generic construction of rrFE. Both of approaches make use of a secure ske...
Robustly Reusable Fuzzy Extractor from Standard Assumptions
Fuzzy extractor Reusability Robustness Standard assumptions
2018/11/19
A fuzzy extractor (FE) aims at deriving and reproducing (almost) uniform cryptographic keys from noisy non-uniform sources. To reproduce an identical key R from subsequent readings of a noisy source, ...
A Reusable Fuzzy Extractor with Practical Storage Size
threshold cryptography key management secret sharing
2018/7/17
After the concept of a Fuzzy Extractor (FE) was rst introduced by Dodis et al. , it has been regarded as one of the candidate solutions for key management utilizing biometric data. With a noisy input...
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol
distance-bounding terrorist-fraud anonymous authentication
2017/4/11
Distance-bounding protocols have been introduced to thwart relay attacks against contactless authentication protocols. In this context, verifiers have to authenticate the credentials of untrusted prov...
Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT
Computational fuzzy extractor Learning with errors Authentication system
2016/12/8
With the advent of the Internet of Things, lightweight devices necessitate secure and cost-efficient key storage. Since traditional secure storage is expensive, the valuable entropy could originate fr...
An i-Vector Extractor Suitable for Speaker Recognition with Both Microphone and Telephone Speech
Speaker Recognition Both Microphone
2015/3/10
An i-Vector Extractor Suitable for Speaker Recognition with Both Microphone and Telephone Speech.
Extractor:支持查询重构的高效数据库关键词检索系统
关键词检索 关系数据库 查询重构 top-k检索
2017/1/14
数据库关键词检索由于具有简便易用的特点,成为数据处理中的一项关键技术和研究热点.目前已有的技术还存在着时间复杂度高、检索结果不够精准等问题.针对存在的问题,本文建立了基于关系数据库的关键词检索系统Extractor.Extractor改进了传统的数据图结构,提出了新的top-k结果树生成和排序机制,提出了基于词关系的查询重构方法.实验证明Extrator具有较好的检索效果和较高检索效率.
We present a generic method to secure various widely-used cryptosystems against \emph{arbitrary} side-channel leakage, as long as the leakage adheres three restrictions: first, it is bounded per obser...
A fuzzy extractor is a security primitive that allows
for reproducible extraction of an almost uniform key from a noisy
non-uniform source. We analyze a fuzzy extractor scheme that
uses universal h...
An Improved Robust Fuzzy Extractor
Robust Fuzzy Extractor post-application robust biometric authentication
2009/6/5
We consider the problem of building robust fuzzy extractors, which allow two parties holding
similar random variablesW, W0 to agree on a secret key R in the presence of an active adversary.
Robust f...
A Study on a Gas Agitated Extractor with Static Mixer
multiphase flow extraction gas agitation
2009/4/28
A Study on a Gas Agitated Extractor with Static Mixer.
Multiple Cation-Exchange Capacity Measurements on Standard Clays Using a Commercial Mechanical Extractor
Apparatus Cation-exchange capacity Ion-exchange method K-fixation Leaching tube 2:1 clay minerals
2011/11/25
Abstract: Sequential cation-exchange capacity (CEC) measurements were obtained from standard clays using a mechanized, variable-rate leaching device. The device consists of a motorized screwjack and a...