Robust Fuzzy Extractors and Authenticated Key Agreement from Close SecretsRobust Fuzzy Extractors and Authenticated Key Agreement • April 21st, 2024
Contract Type FiledApril 21st, 2024Abstract. Consider two parties holding correlated random variables W and W', respectively, that are within distance t of each other in some metric space. These parties wish to agree on a uniformly distributed secret key R by sending a single message over an insecure channel con- trolled by an all-powerful adversary. We consider both the keyless case, where the parties share no additional secret information, and the keyed case, where the parties share a long-term secret SK that they can use to generate a sequence of session keys Rj using multiple pairs (Wj, Wj') . The former has applications to, e.g., biometric authentication, while the latter arises in, e.g., the bounded storage model with errors.
Robust Fuzzy Extractors and Authenticated Key Agreement from Close SecretsRobust Fuzzy Extractors and Authenticated Key Agreement • July 5th, 2006
Contract Type FiledJuly 5th, 2006Abstract. Consider two parties holding correlated random variables W and W', respectively, that are within distance t of each other in some metric space. These parties wish to agree on a uniformly distributed secret key R by sending a single message over an insecure channel con- trolled by an all-powerful adversary. We consider both the keyless case, where the parties share no additional secret information, and the keyed case, where the parties share a long-term secret SK that they can use to generate a sequence of session keys Rj using multiple pairs (Wj, Wj') . The former has applications to, e.g., biometric authentication, while the latter arises in, e.g., the bounded storage model with errors.