{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,3,4]],"date-time":"2023-03-04T03:40:25Z","timestamp":1677901225653},"reference-count":12,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2023,3,1]]},"DOI":"10.1587\/transfun.2022cil0001","type":"journal-article","created":{"date-parts":[[2022,8,9]],"date-time":"2022-08-09T22:12:36Z","timestamp":1660083156000},"page":"350-354","source":"Crossref","is-referenced-by-count":0,"title":["On the Limitations of Computational Fuzzy Extractors"],"prefix":"10.1587","volume":"E106.A","author":[{"given":"Kenji","family":"YASUNAGA","sequence":"first","affiliation":[{"name":"Department of Mathematical and Computing Science, Tokyo Institute of Technology"}]},{"given":"Kosuke","family":"YUZAWA","sequence":"additional","affiliation":[{"name":"Kanazawa University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, \u201cFuzzy extractors: How to generate strong keys from biometrics and other noisy data,\u201d SIAM J. Comput., vol.38, no.1, pp.97-139, 2008. 10.1137\/060651380","DOI":"10.1137\/060651380"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] Y. Dodis, L. Reyzin, and A. Smith, \u201cFuzzy extractors,\u201d Security with Noisy Data, P. Tuyls, B. Skoric, and T. Kevenaar, eds., pp.79-99, Springer, 2007. An updated version is available at http:\/\/www.cs.bu.edu\/~reyzin\/fuzzysurvey.html","DOI":"10.1007\/978-1-84628-984-2_5"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] X. Boyen, \u201cRobust and reusable fuzzy extractor,\u201d Security with Noisy Data, P. Tuyls, B. Skoric, and T. Kevenaar, ed., pp.101-112, Springer, 2007. 10.1007\/978-1-84628-984-2_6","DOI":"10.1007\/978-1-84628-984-2_6"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] J. Radhakrishnan and A. Ta-Shma, \u201cBounds for dispersers, extractors, and depth-two superconcentrators,\u201d SIAM J. Discrete Math., vol.13, no.1, pp.2-24, 2000. 10.1137\/s0895480197329508","DOI":"10.1137\/S0895480197329508"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] B. Fuller, X. Meng, and L. Reyzin, \u201cComputational fuzzy extractors,\u201d ASIACRYPT (1), pp.174-193, 2013. 10.1007\/978-3-642-42033-7_10","DOI":"10.1007\/978-3-642-42033-7_10"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] R. Canetti, B. Fuller, O. Paneth, L. Reyzin, and A.D. Smith, \u201cReusable fuzzy extractors for low-entropy distributions,\u201d Advances in Cryptology-EUROCRYPT 2016-35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I, M. Fischlin and J. Coron, eds., Lecture Notes in Computer Science, vol.9665, pp.117-146, Springer, 2016. 10.1007\/978-3-662-49890-3_5","DOI":"10.1007\/978-3-662-49890-3_5"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] D. Apon, C. Cho, K. Eldefrawy, and J. Katz, \u201cEfficient, reusable fuzzy extractors from LWE,\u201d Cyber Security Cryptography and Machine Learning-First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings, S. Dolev and S. Lodha, ed., Lecture Notes in Computer Science, vol.10332, pp.1-18, Springer, 2017. 10.1007\/978-3-319-60080-2_1","DOI":"10.1007\/978-3-319-60080-2_1"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] C. Herder, L. Ren, M. van Dijk, M.M. Yu, and S. Devadas, \u201cTrapdoor computational fuzzy extractors and stateless cryptographically-secure physical unclonable functions,\u201d IEEE Trans. Dependable Secure Comput., vol.14, no.1, pp.65-82, 2017. 10.1109\/tdsc.2016.2536609","DOI":"10.1109\/TDSC.2016.2536609"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] Y. Wen, S. Liu, and S. Han, \u201cReusable fuzzy extractor from the decisional Diffie-Hellman assumption,\u201d Des. Codes Cryptogr., vol.86, pp.2495-2512, 2018. https:\/\/doi.org\/10.1007\/s10623-018-0459-4 10.1007\/s10623-018-0459-4","DOI":"10.1007\/s10623-018-0459-4"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] Y. Wen and S. Liu, \u201cReusable fuzzy extractor from LWE,\u201d Information Security and Privacy-23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, W. Susilo and G. Yang, eds., Lecture Notes in Computer Science, vol.10946, pp.13-27, Springer, 2018. 10.1007\/978-3-319-93638-3_2","DOI":"10.1007\/978-3-319-93638-3_2"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] Y. Wen and S. Liu, \u201cRobustly reusable fuzzy extractor from standard assumptions,\u201d Advances in Cryptology-ASIACRYPT 2018-24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, Dec. 2-6, 2018, Proceedings, Part III, T. Peyrin and S.D. Galbraith, eds., Lecture Notes in Computer Science, vol.11274, pp.459-489, Springer, 2018. 10.1007\/978-3-030-03332-3_17","DOI":"10.1007\/978-3-030-03332-3_17"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] Y. Wen, S. Liu, and D. Gu, \u201cGeneric constructions of robustly reusable fuzzy extractor,\u201d Public-Key Cryptography-PKC 2019-22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II, D. Lin and K. Sako, eds., Lecture Notes in Computer Science, vol.11443, pp.349-378, Springer, 2019. 10.1007\/978-3-030-17259-6_12","DOI":"10.1007\/978-3-030-17259-6_12"}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E106.A\/3\/E106.A_2022CIL0001\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,4]],"date-time":"2023-03-04T03:17:40Z","timestamp":1677899860000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E106.A\/3\/E106.A_2022CIL0001\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,1]]},"references-count":12,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2022cil0001","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,1]]},"article-number":"2022CIL0001"}}