Computational fuzzy extractors
Fuzzy extractors derive strong keys from noisy sources. Their security is usually defined information-theoretically, with gaps between known negative results, existential constructions, and polynomial-time constructions. We ask whether using computational security can close these gaps. We show the f...
Saved in:
Published in | Information and computation Vol. 275; p. 104602 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Elsevier Inc
01.12.2020
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Be the first to leave a comment!