Fuzzy extractors

Yevgeniy Dodis, Leonid Reyzin, Adam Smith

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

This chapter presents a general approach for handling secret biometric data in cryptographic applications. The generality manifests itself in two ways: We attempt to minimize the assumptions we make about the data and to present techniques that are broadly applicable wherever biometric inputs are used.

Original languageEnglish (US)
Title of host publicationSecurity with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting
PublisherSpringer London
Pages79-99
Number of pages21
ISBN (Print)9781846289835
DOIs
StatePublished - 2007

Fingerprint

Biometrics

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Dodis, Y., Reyzin, L., & Smith, A. (2007). Fuzzy extractors. In Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting (pp. 79-99). Springer London. https://doi.org/10.1007/978-1-84628-984-2_5

Fuzzy extractors. / Dodis, Yevgeniy; Reyzin, Leonid; Smith, Adam.

Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting. Springer London, 2007. p. 79-99.

Research output: Chapter in Book/Report/Conference proceedingChapter

Dodis, Y, Reyzin, L & Smith, A 2007, Fuzzy extractors. in Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting. Springer London, pp. 79-99. https://doi.org/10.1007/978-1-84628-984-2_5
Dodis Y, Reyzin L, Smith A. Fuzzy extractors. In Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting. Springer London. 2007. p. 79-99 https://doi.org/10.1007/978-1-84628-984-2_5
Dodis, Yevgeniy ; Reyzin, Leonid ; Smith, Adam. / Fuzzy extractors. Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting. Springer London, 2007. pp. 79-99
@inbook{1bbc0cfa07a940409aea57e48fda29ab,
title = "Fuzzy extractors",
abstract = "This chapter presents a general approach for handling secret biometric data in cryptographic applications. The generality manifests itself in two ways: We attempt to minimize the assumptions we make about the data and to present techniques that are broadly applicable wherever biometric inputs are used.",
author = "Yevgeniy Dodis and Leonid Reyzin and Adam Smith",
year = "2007",
doi = "10.1007/978-1-84628-984-2_5",
language = "English (US)",
isbn = "9781846289835",
pages = "79--99",
booktitle = "Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting",
publisher = "Springer London",

}

TY - CHAP

T1 - Fuzzy extractors

AU - Dodis, Yevgeniy

AU - Reyzin, Leonid

AU - Smith, Adam

PY - 2007

Y1 - 2007

N2 - This chapter presents a general approach for handling secret biometric data in cryptographic applications. The generality manifests itself in two ways: We attempt to minimize the assumptions we make about the data and to present techniques that are broadly applicable wherever biometric inputs are used.

AB - This chapter presents a general approach for handling secret biometric data in cryptographic applications. The generality manifests itself in two ways: We attempt to minimize the assumptions we make about the data and to present techniques that are broadly applicable wherever biometric inputs are used.

UR - http://www.scopus.com/inward/record.url?scp=84873433835&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84873433835&partnerID=8YFLogxK

U2 - 10.1007/978-1-84628-984-2_5

DO - 10.1007/978-1-84628-984-2_5

M3 - Chapter

AN - SCOPUS:84873433835

SN - 9781846289835

SP - 79

EP - 99

BT - Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting

PB - Springer London

ER -