{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:06:07Z","timestamp":1773511567912,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031157769","type":"print"},{"value":"9783031157776","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15777-6_8","type":"book-chapter","created":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T15:24:33Z","timestamp":1661268273000},"page":"128-147","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Secure Sketch and\u00a0Fuzzy Extractor with\u00a0Imperfect Randomness: An Information-Theoretic Study"],"prefix":"10.1007","author":[{"given":"Kaini","family":"Chen","sequence":"first","affiliation":[]},{"given":"Peisong","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Kewei","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Chi","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,24]]},"reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-60080-2_1","volume-title":"Cyber Security Cryptography and Machine Learning","author":"D Apon","year":"2017","unstructured":"Apon, D., Cho, C., Eldefrawy, K., Katz, J.: Efficient, reusable fuzzy extractors from LWE. In: Dolev, S., Lodha, S. (eds.) CSCML 2017. LNCS, vol. 10332, pp. 1\u201318. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-60080-2_1"},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1007\/978-3-319-28166-7_33","volume-title":"Applied Cryptography and Network Security","author":"M Backes","year":"2015","unstructured":"Backes, M., Kate, A., Meiser, S., Ruffing, T.: Secrecy without perfect randomness: cryptography with (bounded) weak sources. In: Malkin, T., Kolesnikov, V., Lewko, A.B., Polychronakis, M. (eds.) ACNS 2015. LNCS, vol. 9092, pp. 675\u2013695. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-28166-7_33"},{"issue":"6","key":"8_CR3","doi-asserted-by":"publisher","first-page":"2724","DOI":"10.1109\/18.720553","volume":"44","author":"CH Bennett","year":"1998","unstructured":"Bennett, C.H., Shor, P.W.: Quantum information theory. IEEE Trans. Inf. Theory 44(6), 2724\u20132742 (1998). https:\/\/doi.org\/10.1109\/18.720553","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"9","key":"8_CR4","doi-asserted-by":"publisher","first-page":"1433","DOI":"10.1109\/TIFS.2013.2272786","volume":"8","author":"M Blanton","year":"2013","unstructured":"Blanton, M., Aliasgari, M.: Analysis of reusability of secure sketches and fuzzy extractors. IEEE Trans. Inf. Forensics Secur. 8(9), 1433\u20131445 (2013). https:\/\/doi.org\/10.1109\/TIFS.2013.2272786","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR5","doi-asserted-by":"publisher","unstructured":"Boyen, X.: Reusable cryptographic fuzzy extractors. In: Atluri, V., Pfitzmann, B., McDaniel, P.D. (eds.) Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, 25\u201329 October 2004, pp. 82\u201391. ACM (2004). https:\/\/doi.org\/10.1145\/1030083.1030096","DOI":"10.1145\/1030083.1030096"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/11426639_9","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"X Boyen","year":"2005","unstructured":"Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure remote authentication using biometric data. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 147\u2013163. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_9"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Chattopadhyay, E., et al.: Explicit two-source extractors and more. Ph.D. thesis (2016)","DOI":"10.1145\/2897518.2897528"},{"issue":"2","key":"8_CR8","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1137\/0217015","volume":"17","author":"B Chor","year":"1988","unstructured":"Chor, B., Goldreich, O.: Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM J. Comput. 17(2), 230\u2013261 (1988). https:\/\/doi.org\/10.1137\/0217015","journal-title":"SIAM J. Comput."},{"issue":"5","key":"8_CR9","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.1007\/s10623-021-00843-1","volume":"89","author":"N Cui","year":"2021","unstructured":"Cui, N., Liu, S., Gu, D., Weng, J.: Robustly reusable fuzzy extractor with imperfect randomness. Des. Codes Crypt. 89(5), 1017\u20131059 (2021). https:\/\/doi.org\/10.1007\/s10623-021-00843-1","journal-title":"Des. Codes Crypt."},{"issue":"1","key":"8_CR10","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TCSVT.2003.818350","volume":"14","author":"J Daugman","year":"2004","unstructured":"Daugman, J.: How iris recognition works. IEEE Trans. Circuits Syst. Video Technol. 14(1), 21\u201330 (2004). https:\/\/doi.org\/10.1109\/TCSVT.2003.818350","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/978-3-540-27821-4_30","volume-title":"Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques","author":"Y Dodis","year":"2004","unstructured":"Dodis, Y., Elbaz, A., Oliveira, R., Raz, R.: Improved randomness extraction from two independent sources. In: Jansen, K., Khanna, S., Rolim, J.D.P., Ron, D. (eds.) APPROX\/RANDOM 2004. LNCS, vol. 3122, pp. 334\u2013344. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-27821-4_30"},{"issue":"1","key":"8_CR12","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y Dodis","year":"2008","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.D.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97\u2013139 (2008). https:\/\/doi.org\/10.1137\/060651380","journal-title":"SIAM J. Comput."},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-36594-2_1","volume-title":"Theory of Cryptography","author":"Y Dodis","year":"2013","unstructured":"Dodis, Y., Yu, Yu.: Overcoming weak expectations. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 1\u201322. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-36594-2_1"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/978-3-642-42033-7_10","volume-title":"Advances in Cryptology - ASIACRYPT 2013","author":"B Fuller","year":"2013","unstructured":"Fuller, B., Meng, X., Reyzin, L.: Computational fuzzy extractors. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part I. LNCS, vol. 8269, pp. 174\u2013193. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-42033-7_10"},{"issue":"4","key":"8_CR15","doi-asserted-by":"publisher","first-page":"1364","DOI":"10.1137\/S0097539793244708","volume":"28","author":"J H\u00e5stad","year":"1999","unstructured":"H\u00e5stad, J., Impagliazzo, R., Levin, L.A., Luby, M.: A pseudorandom generator from any one-way function. SIAM J. Comput. 28(4), 1364\u20131396 (1999). https:\/\/doi.org\/10.1137\/S0097539793244708","journal-title":"SIAM J. Comput."},{"issue":"8","key":"8_CR16","doi-asserted-by":"publisher","first-page":"1126","DOI":"10.1109\/JPROC.2014.2320516","volume":"102","author":"C Herder","year":"2014","unstructured":"Herder, C., Yu, M.M., Koushanfar, F., Devadas, S.: Physical unclonable functions and applications: a tutorial. Proc. IEEE 102(8), 1126\u20131141 (2014). https:\/\/doi.org\/10.1109\/JPROC.2014.2320516","journal-title":"Proc. IEEE"},{"issue":"2","key":"8_CR17","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10623-005-6343-z","volume":"38","author":"A Juels","year":"2006","unstructured":"Juels, A., Sudan, M.: A fuzzy vault scheme. Des. Codes Cryptogr. 38(2), 237\u2013257 (2006). https:\/\/doi.org\/10.1007\/s10623-005-6343-z","journal-title":"Des. Codes Cryptogr."},{"key":"8_CR18","doi-asserted-by":"publisher","unstructured":"Li, X.: Non-malleable extractors, two-source extractors and privacy amplification. In: 53rd Annual IEEE Symposium on Foundations of Computer Science, FOCS 2012, New Brunswick, NJ, USA, 20\u201323 October 2012, pp. 688\u2013697. IEEE Computer Society (2012). https:\/\/doi.org\/10.1109\/FOCS.2012.26","DOI":"10.1109\/FOCS.2012.26"},{"key":"8_CR19","doi-asserted-by":"publisher","unstructured":"Marasco, E., Ross, A.: A survey on antispoofing schemes for fingerprint recognition systems. ACM Comput. Surv. 47(2), 28:1\u201328:36 (2014). https:\/\/doi.org\/10.1145\/2617756","DOI":"10.1145\/2617756"},{"issue":"1","key":"8_CR20","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1006\/jcss.1996.0004","volume":"52","author":"N Nisan","year":"1996","unstructured":"Nisan, N., Zuckerman, D.: Randomness is linear in space. J. Comput. Syst. Sci. 52(1), 43\u201352 (1996). https:\/\/doi.org\/10.1006\/jcss.1996.0004","journal-title":"J. Comput. Syst. Sci."},{"key":"8_CR21","doi-asserted-by":"publisher","unstructured":"Raz, R.: Extractors with weak random seeds. In: Gabow, H.N., Fagin, R. (eds.) Proceedings of the 37th Annual ACM Symposium on Theory of Computing, Baltimore, MD, USA, 22\u201324 May 2005, pp. 11\u201320. ACM (2005). https:\/\/doi.org\/10.1145\/1060590.1060593","DOI":"10.1145\/1060590.1060593"},{"key":"8_CR22","doi-asserted-by":"publisher","unstructured":"Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Proceedings of the 44th Design Automation Conference, DAC 2007, San Diego, CA, USA, 4\u20138 June 2007, pp. 9\u201314. IEEE (2007). https:\/\/doi.org\/10.1145\/1278480.1278484","DOI":"10.1145\/1278480.1278484"},{"issue":"1\u20133","key":"8_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/0400000010","volume":"7","author":"SP Vadhan","year":"2012","unstructured":"Vadhan, S.P.: Pseudorandomness. Found. Trends Theor. Comput. Sci. 7(1\u20133), 1\u2013336 (2012). https:\/\/doi.org\/10.1561\/0400000010","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"8_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/978-3-030-03332-3_17","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2018","author":"Y Wen","year":"2018","unstructured":"Wen, Y., Liu, S.: Robustly reusable fuzzy extractor from standard assumptions. In: Peyrin, T., Galbraith, S. (eds.) ASIACRYPT 2018, Part III. LNCS, vol. 11274, pp. 459\u2013489. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03332-3_17"},{"issue":"11","key":"8_CR25","doi-asserted-by":"publisher","first-page":"2495","DOI":"10.1007\/s10623-018-0459-4","volume":"86","author":"Y Wen","year":"2018","unstructured":"Wen, Y., Liu, S., Han, S.: Reusable fuzzy extractor from the decisional Diffie\u2013Hellman assumption. Des. Codes Crypt. 86(11), 2495\u20132512 (2018). https:\/\/doi.org\/10.1007\/s10623-018-0459-4","journal-title":"Des. Codes Crypt."},{"key":"8_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-319-04268-8_10","volume-title":"Information Theoretic Security","author":"Y Yao","year":"2014","unstructured":"Yao, Y., Li, Z.: Overcoming weak expectations via the R\u00e9enyi entropy and the expanded computational entropy. In: Padr\u00f3, C. (ed.) ICITS 2013. LNCS, vol. 8317, pp. 162\u2013178. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-04268-8_10"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15777-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T17:06:38Z","timestamp":1709831198000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15777-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031157769","9783031157776"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15777-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}