Computational fuzzy extractors

Fuzzy extractors derive strong keys from noisy sources. Their security is usually defined information-theoretically, with gaps between known negative results, existential constructions, and polynomial-time constructions. We ask whether using computational security can close these gaps. We show the f...

Full description

Saved in:
Bibliographic Details
Published inInformation and computation Vol. 275; p. 104602
Main Authors Fuller, Benjamin, Meng, Xianrui, Reyzin, Leonid
Format Journal Article
LanguageEnglish
Published Elsevier Inc 01.12.2020
Subjects
Online AccessGet full text

Cover

Loading…