Lossless fuzzy extractor enabled secure authentication using low entropy noisy sources.
Yen-Lung LaiMinyi LiShiuan-Ni LiangZhe JinPublished in: J. Inf. Secur. Appl. (2021)
Keyphrases
- user authentication
- authentication scheme
- authentication mechanism
- authentication protocol
- identity management
- data encryption
- fuzzy entropy
- security analysis
- password authentication
- key distribution
- security mechanisms
- fuzzy sets
- security requirements
- fuzzy logic
- factor authentication
- security services
- secure manner
- integrity verification
- information theory
- fuzzy numbers
- fuzzy rules
- low signal to noise ratio
- information theoretic
- identity authentication
- secret image sharing
- lightweight
- secure communication
- public key cryptography
- membership functions
- image compression
- biometric authentication
- rough sets
- key exchange protocol
- rights management
- data sources
- key agreement
- encryption decryption
- key agreement protocol
- private key
- data embedding
- key management
- lossless compression
- mutual information