Fuzzy commitment

12Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The purpose of this chapter is to introduce fuzzy commitment, one of the earliest and simplest constructions geared toward cryptography over noisy data. The chapter also explores applications of fuzzy commitment to two problems in data security: (1) secure management of biometrics, with a focus on iriscodes, and (2) use of knowledge-based authentication (i.e., personal questions) for password recovery. © 2007 Springer-Verlag London.

Cite

CITATION STYLE

APA

Juels, A. (2007). Fuzzy commitment. In Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting (pp. 45–56). Springer London. https://doi.org/10.1007/978-1-84628-984-2_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free