Common Contracts

2 similar Extractors and Authenticated Key Agreement contracts

Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
Extractors and Authenticated Key Agreement • April 21st, 2024

Abstract. Consider two parties holding correlated random variables W and W', respectively, that are within distance t of each other in some metric space. These parties wish to agree on a uniformly distributed secret key R by sending a single message over an insecure channel con- trolled by an all-powerful adversary. We consider both the keyless case, where the parties share no additional secret information, and the keyed case, where the parties share a long-term secret SK that they can use to generate a sequence of session keys Rj using multiple pairs (Wj, Wj') . The former has applications to, e.g., biometric authentication, while the latter arises in, e.g., the bounded storage model with errors.

AutoNDA by SimpleDocs
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
Extractors and Authenticated Key Agreement • July 5th, 2006

Abstract. Consider two parties holding correlated random variables W and W', respectively, that are within distance t of each other in some metric space. These parties wish to agree on a uniformly distributed secret key R by sending a single message over an insecure channel con- trolled by an all-powerful adversary. We consider both the keyless case, where the parties share no additional secret information, and the keyed case, where the parties share a long-term secret SK that they can use to generate a sequence of session keys Rj using multiple pairs (Wj, Wj') . The former has applications to, e.g., biometric authentication, while the latter arises in, e.g., the bounded storage model with errors.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!