Fuzzy authentication allows authentication based on the fuzzy matching of two objects, for example based on the similarity of two strings in the Hamming metric, or on the similiarity of two sets in the set difference metric. Aim of this paper is to show other models and algorithms of secure fuzzy authentication, which can be performed using the rank metric. A few schemes are presented which can then be applied in different scenarios and applications.
Fuzzy authentication using rank distance / Neri, A.; Rosenthal, J.; Schipani, D.. - 447:(2018), pp. 97-108. ( 2nd Workshop on Communication Security, WCS 2017 fra 2017) [10.1007/978-3-319-59265-7_7].
Fuzzy authentication using rank distance
Neri A.;
2018
Abstract
Fuzzy authentication allows authentication based on the fuzzy matching of two objects, for example based on the similarity of two strings in the Hamming metric, or on the similiarity of two sets in the set difference metric. Aim of this paper is to show other models and algorithms of secure fuzzy authentication, which can be performed using the rank metric. A few schemes are presented which can then be applied in different scenarios and applications.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.


