{PointerGuess}: Targeted Password Guessing Model Using Pointer Mechanism

K Xiu, D Wang - 33rd USENIX Security Symposium (USENIX Security …, 2024 - usenix.org
Most existing targeted password guessing models view users' reuse behaviors as
sequences of edit operations (eg, insert and delete) performed on old passwords. These …

A Survey of Wireless Sensing Security from a Role-Based View: Victim, Weapon, and Shield

R Geng, J Wang, Y Yuan, F Zhan, T Zhang… - arXiv preprint arXiv …, 2024 - arxiv.org
Wireless sensing technology has become prevalent in healthcare, smart homes, and
autonomous driving due to its non-contact operation, penetration capabilities, and cost …

A quasilinear-time CVP algorithm for triangular lattice based fuzzy extractors and fuzzy signatures

K Takahashi, W Nakamura - 2024 Asia Pacific Signal and …, 2024 - ieeexplore.ieee.org
Fuzzy Extractor (FE) and Fuzzy Signature (FS) are useful schemes for generating
cryptographic keys from fuzzy data such as biometric features. To implement FE and FS for …

EEG-based identification and cryptographic key generation system using extracted features from transformer-based models

M Zeynali, H Narimani, H Seyedarabi - Signal, Image and Video …, 2024 - Springer
Biometric systems use the unique behavioral or physical characteristics of a user to verify
their claimed identity. Due to the high probability of forgery or theft of traditional passwords …

Biometrics-Based Authenticated Key Exchange with Multi-Factor Fuzzy Extractor

HY Tran, J Hu, W Hu - arXiv preprint arXiv:2405.11456, 2024 - arxiv.org
Existing fuzzy extractors and similar methods provide an effective way for extracting a secret
key from a user's biometric data, but are susceptible to impersonation attack: once a valid …

Hypersphere Secure Sketch Revisited: Probabilistic Linear Regression Attack on IronMask in Multiple Usage

P Zhu, L Wang - arXiv preprint arXiv:2409.12884, 2024 - arxiv.org
Protection of biometric templates is a critical and urgent area of focus. IronMask
demonstrates outstanding recognition performance while protecting facial templates against …

A Blockchain Consensus Protocol Based on Fuzzy Signatures

P Santini, G Rafaiani, M Battaglioni… - … 2023-2023 IEEE …, 2023 - ieeexplore.ieee.org
We propose a protocol to jointly achieve authentication and consensus on a blockchain
network, in which endpoints are required to digitally sign some random message using fuzzy …

Fuzzy Signature with Biometric-Independent Verification

H Higo, T Isshiki, S Otsuki… - … Conference of the …, 2023 - ieeexplore.ieee.org
Just as biometric authentication has replaced conventional authentication methods to
improve convenience and security, fuzzy signatures (FS), a technique that replaces the …

A Provably Secure Lattice-Based Fuzzy Signature Scheme Using Linear Sketch

M Zheng, ZY Liu, M Mambo - IEEE Access, 2023 - ieeexplore.ieee.org
Fuzzy signatures (FS) are a kind of signature scheme that employs a noisy string (eg,
biometric data) as the secret key without requiring the user-specific auxiliary data. As the …

A Linear-Time Algorithm for the Closest Vector Problem of Triangular Lattices

K Takahashi, W Nakamura - arXiv preprint arXiv:2412.06091, 2024 - arxiv.org
Fuzzy Extractor (FE) and Fuzzy Signature (FS) are useful schemes for generating
cryptographic keys from fuzzy data such as biometric features. Several techniques have …