Strong key derivation from noisy sources
A shared cryptographic key enables strong authentication. Candidate sources for creating such a shared key include biometrics and physically unclonable functions. However, these sources come with a substantial problem: noise in repeated readings. A fuzzy extractor produces a stable key from a n...
Main Author: | |
---|---|
Language: | en_US |
Published: |
2016
|
Subjects: | |
Online Access: | https://hdl.handle.net/2144/15636 |