Reusable and robust fuzzy extractor for CRS-dependent sources
Abstract Fuzzy extractors allow for the extraction and reproduction of a nearly uniform string from a noisy and non-uniform source. Reusable and robust fuzzy extractors further require that the output string should remain pseudorandom under multiple extractions and any modification of public value s...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2025-01-01
|
Series: | Cybersecurity |
Subjects: | |
Online Access: | https://doi.org/10.1186/s42400-024-00294-w |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832594651406663680 |
---|---|
author | Yucheng Ma Peisong Shen Xue Tian Kewei Lv Chi Chen |
author_facet | Yucheng Ma Peisong Shen Xue Tian Kewei Lv Chi Chen |
author_sort | Yucheng Ma |
collection | DOAJ |
description | Abstract Fuzzy extractors allow for the extraction and reproduction of a nearly uniform string from a noisy and non-uniform source. Reusable and robust fuzzy extractors further require that the output string should remain pseudorandom under multiple extractions and any modification of public value should be detectable. Existing constructions of reusable and robust fuzzy extractors are all designed in the Common Reference String (CRS) model and work only for CRS-independent sources. In this work, we introduce a construction of reusable and robust fuzzy extractor for CRS-dependent sources. Our construction is built upon some well-studied cryptography, including a collision resistant hash function, a symmetric key encryption that keeps secure with respect to auxiliary input, a public key encryption and simulation-sound non-interactive zero-knowledge argument. We also present some instantiations of these primitives from Learning with Parity Noise (LPN) assumption and Short Integer Solution (SIS) assumption. These instantiations result in the first reusable and robust fuzzy extractor for CRS-dependent sources that can tolerate linear errors. |
format | Article |
id | doaj-art-c8a66964901c426aa63966bfc1a966bc |
institution | Kabale University |
issn | 2523-3246 |
language | English |
publishDate | 2025-01-01 |
publisher | SpringerOpen |
record_format | Article |
series | Cybersecurity |
spelling | doaj-art-c8a66964901c426aa63966bfc1a966bc2025-01-19T12:27:59ZengSpringerOpenCybersecurity2523-32462025-01-018111710.1186/s42400-024-00294-wReusable and robust fuzzy extractor for CRS-dependent sourcesYucheng Ma0Peisong Shen1Xue Tian2Kewei Lv3Chi Chen4Institute of Information Engineering, Chinese Academy of SciencesInstitute of Information Engineering, Chinese Academy of SciencesInstitute of Information Engineering, Chinese Academy of SciencesInstitute of Information Engineering, Chinese Academy of SciencesInstitute of Information Engineering, Chinese Academy of SciencesAbstract Fuzzy extractors allow for the extraction and reproduction of a nearly uniform string from a noisy and non-uniform source. Reusable and robust fuzzy extractors further require that the output string should remain pseudorandom under multiple extractions and any modification of public value should be detectable. Existing constructions of reusable and robust fuzzy extractors are all designed in the Common Reference String (CRS) model and work only for CRS-independent sources. In this work, we introduce a construction of reusable and robust fuzzy extractor for CRS-dependent sources. Our construction is built upon some well-studied cryptography, including a collision resistant hash function, a symmetric key encryption that keeps secure with respect to auxiliary input, a public key encryption and simulation-sound non-interactive zero-knowledge argument. We also present some instantiations of these primitives from Learning with Parity Noise (LPN) assumption and Short Integer Solution (SIS) assumption. These instantiations result in the first reusable and robust fuzzy extractor for CRS-dependent sources that can tolerate linear errors.https://doi.org/10.1186/s42400-024-00294-wFuzzy extractorRobustnessReusabilityCRS-dependent source |
spellingShingle | Yucheng Ma Peisong Shen Xue Tian Kewei Lv Chi Chen Reusable and robust fuzzy extractor for CRS-dependent sources Cybersecurity Fuzzy extractor Robustness Reusability CRS-dependent source |
title | Reusable and robust fuzzy extractor for CRS-dependent sources |
title_full | Reusable and robust fuzzy extractor for CRS-dependent sources |
title_fullStr | Reusable and robust fuzzy extractor for CRS-dependent sources |
title_full_unstemmed | Reusable and robust fuzzy extractor for CRS-dependent sources |
title_short | Reusable and robust fuzzy extractor for CRS-dependent sources |
title_sort | reusable and robust fuzzy extractor for crs dependent sources |
topic | Fuzzy extractor Robustness Reusability CRS-dependent source |
url | https://doi.org/10.1186/s42400-024-00294-w |
work_keys_str_mv | AT yuchengma reusableandrobustfuzzyextractorforcrsdependentsources AT peisongshen reusableandrobustfuzzyextractorforcrsdependentsources AT xuetian reusableandrobustfuzzyextractorforcrsdependentsources AT keweilv reusableandrobustfuzzyextractorforcrsdependentsources AT chichen reusableandrobustfuzzyextractorforcrsdependentsources |