Skip to main content

Showing 1–2 of 2 results for author: Tran, H Y

  1. arXiv:2405.11456  [pdf, other

    cs.CR

    Biometrics-Based Authenticated Key Exchange with Multi-Factor Fuzzy Extractor

    Authors: Hong Yen Tran, Jiankun Hu, Wen Hu

    Abstract: Existing fuzzy extractors and similar methods provide an effective way for extracting a secret key from a user's biometric data, but are susceptible to impersonation attack: once a valid biometric sample is captured, the scheme is no longer secure. We propose a novel multi-factor fuzzy extractor that integrates both a user's secret (e.g., a password) and a user's biometrics in the generation and r… ▽ More

    Submitted 19 May, 2024; originally announced May 2024.

    Comments: 17 pages

  2. arXiv:2302.01733  [pdf, other

    cs.CR cs.DB cs.IR

    Committed Private Information Retrieval

    Authors: Quang Cao, Hong Yen Tran, Son Hoang Dau, Xun Yi, Emanuele Viterbo, Chen Feng, Yu-Chih Huang, Jingge Zhu, Stanislav Kruglik, Han Mao Kiah

    Abstract: A private information retrieval (PIR) scheme allows a client to retrieve a data item $x_i$ among $n$ items $x_1,x_2,\ldots,x_n$ from $k$ servers, without revealing what $i$ is even when $t < k$ servers collude and try to learn $i$. Such a PIR scheme is said to be $t$-private. A PIR scheme is $v$-verifiable if the client can verify the correctness of the retrieved $x_i$ even when $v \leq k$ servers… ▽ More

    Submitted 25 September, 2023; v1 submitted 3 February, 2023; originally announced February 2023.

    Comments: Accepted at ESORICS 2023