Posted by: atri | March 4, 2011

Lecture 19: Fuzzy Vault-III

In today’s lecture we finished our study of the Juels Sudan fuzzy vault construction. Next lecture, we will start with Shannon’s view of coding theory.

As I had mentioned in class, there is follow-up work to the Juels Sudan work that in some sense have better security guarantees. See this survey for more.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Categories

%d bloggers like this: