Elements of information theory
Elements of information theory
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Correcting errors without leaking partial information
Proceedings of the thirty-seventh annual ACM symposium on Theory of computing
Designs, Codes and Cryptography
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
SIAM Journal on Computing
Iterative decoding of binary block and convolutional codes
IEEE Transactions on Information Theory
The capacity of low-density parity-check codes under message-passing decoding
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Improved bit-flipping decoding of low-density parity-check codes
IEEE Transactions on Information Theory
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
The last decades have seen a growing interest in hash functions that allow some sort of tolerance, e.g. for the purpose of biometric authentication. Among these, the syndrome fuzzy hashing construction allows to securely store biometric data and to perform user authentication without the need of sharing any secret key. This paper analyzes such a model, showing that it offers a suitable protection against information leakage and several advantages with respect to similar solutions, like the fuzzy commitment scheme. The design and characterization of LDPC codes to be used for this purpose is also addressed.