توضیحات
ABSTRACT
We describe a simple and novel cryptographic construction that we refer to as a fuzzy vault. A player Alice may place a secret value in a fuzzy vault and ”lock” it using a set A of elements from some
public universe U. If Bob tries to unlock” the vault using a set B of similar length, he obtains only if B is close to A, i.e., only if A and B overlap substantially. In constrast to previous constructions of this avor ours possesses the useful feature of order invariance, meaning that the ordering of A and B is immaterial to the functioning of the vault. As we show, our scheme enjoys provable security against a computationally unbounded attacker.
INTRODUCTION
Alice is a movie lover. She is looking to nd someone who shares her taste in movies, but does not want to reveal information about her preferences indiscriminately to other people. One approach she might take is to compile a set
A of her favorite movies and publish it in a concealed form. For instance, Alice might post to a Web newsgroup a ciphertext CA representing an encryption of her telephone number telA under the set (here, key) A. In this case, if another person, say Bob, comes along with a set B of his own favorites that is identical to A, then he can decrypt CA and obtain Alice’s phone number. If Bob tries to decrypt CA with a set dierent than Alice’s, he will fail to obtain her telephone number. A drawback to this approach is its exactitude, or lack of error-tolerance.
Year: 2004
Publisher: RSA Laboratories Bedford, MIT Laboratory for Computer Science
By:Ari Juels and Madhu Sudan
File information: English Language / 18 Page / Size : 161 Kb
Download : click
سال: 2004
ناشر:RSA Laboratories Bedford, MIT Laboratory for Computer Science
کاری از: Ari Juels and Madhu Sudan
اطلاعات فایل: زبان انگلیسی/ 18 صفحه/ حجم 161 کیلوبایت
لینک دانلود : روی همین لینک کلیک کنید
نقد و بررسیها
هیچ دیدگاهی برای این محصول نوشته نشده است.