This content will become publicly available on November 1, 2025
                            
                            Discrete-Time Finite Fuzzy Markov Chains Realized Through Supervised Learning Stochastic Fuzzy Discrete Event Systems
                        
                    - Award ID(s):
- 2146615
- PAR ID:
- 10611080
- Publisher / Repository:
- IEEE
- Date Published:
- Journal Name:
- IEEE Transactions on Fuzzy Systems
- Volume:
- 32
- Issue:
- 11
- ISSN:
- 1063-6706
- Page Range / eLocation ID:
- 6088 to 6100
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
- 
            Pöpper, Christina; Batina, Lejla (Ed.)Fuzzy extractors derive stable keys from noisy sources non-interactively (Dodis et al., SIAM Journal of Computing 2008). Since their introduction, research has focused on two tasks: 1) showing security for as many distributions as possible and 2) providing stronger security guarantees including allowing one to enroll the same value multiple times (reusability), security against an active attacker (robustness), and preventing leakage about the enrolled value (privacy). Given the need for progress on the basic fuzzy extractor primitive, it is prudent to seek generic mechanisms to transform a fuzzy extractor into one that is robust, private, and reusable so that it can inherit further improvements. This work asks if one can generically upgrade fuzzy extractors to achieve robustness, privacy, and reusability. We show positive and negative results: we show upgrades for robustness and privacy, but we provide a negative result on reuse. 1. We upgrade (private) fuzzy extractors to be robust under weaker assumptions than previously known in the common reference string model. 2. We show a generic upgrade for a private fuzzy extractor using multi-bit compute and compare (MBCC) obfuscation (Wichs and Zirdelis, FOCS 2017) that requires less entropy than prior work. 3. We show one cannot arbitrarily compose private fuzzy extractors. In particular, we show that assuming MBCC obfuscation and collision-resistant hash functions, there does not exist a private fuzzy extractor secure against unpredictable auxiliary inputs, strengthening a negative result of Brzuska et al. (Crypto 2014).more » « less
 An official website of the United States government
An official website of the United States government 
				
			 
					 
					
