A fuzzy vault scheme

作者: A. Juels , M. Sudan

DOI: 10.1109/ISIT.2002.1023680

关键词:

摘要: We describe a simple and novel cryptographic construction that we call fuzzy vault. Alice may place secret value /spl kappa/ in vault "lock" it using an unordered set A of elements from some public universe U. If Bob tries to "unlock" the B, he obtains only if B is close A, i.e., overlap substantially.

参考文章(27)
Mike Loukides, John Gilmore, Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design O'Reilly & Associates, Inc.. ,(1998)
Victor Boyko, Philip MacKenzie, Sarvar Patel, Provably secure password-authenticated key exchange using Diffie-Hellman theory and application of cryptographic techniques. pp. 156- 171 ,(2000) , 10.1007/3-540-45539-6_12
Fabian Monrose, Ian Jermyn, Aviel D. Rubin, Michael K. Reiter, Alain Mayer, The design and analysis of graphical passwords usenix security symposium. pp. 1- 1 ,(1999)
Jacques Stern, A new identification scheme based on syndrome decoding international cryptology conference. pp. 13- 21 ,(1993) , 10.1007/3-540-48329-2_2
Markus Jakobsson, Moti Yung, Proving Without Knowing: On Oblivious, Agnostic and Blindolded Provers international cryptology conference. pp. 186- 200 ,(1996) , 10.1007/3-540-68697-5_15
Mohssen Alabbadi, Stephen B. Wicker, A Digital Signature Scheme Based on Linear Error-correcting Block Codes international cryptology conference. pp. 238- 248 ,(1994) , 10.1007/BFB0000438
Elwyn R. Berlekamp, Algebraic Coding Theory ,(1984)
Charles H. Bennett, Gilles Brassard, Claude Crépeau, Marie-Hélène Skubiszewska, Practical Quantum Oblivious Transfer international cryptology conference. pp. 351- 366 ,(1991) , 10.1007/3-540-46766-1_29
Daniel Bleichenbacher, Phong Q. Nguyen, Noisy polynomial interpolation and noisy chinese remaindering theory and application of cryptographic techniques. pp. 53- 69 ,(2000) , 10.1007/3-540-45539-6_4
Torben Pryds Pedersen, Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing international cryptology conference. pp. 129- 140 ,(1991) , 10.1007/3-540-46766-1_9