
Associate Professor, School of Computing
benjamin.fuller@uconn.edu | |
Phone | (860) 486-2122 |
Mailing Address | University of Connecticut 371 Fairfield Way, Unit 4155 Storrs, CT 06269-4155 |
Campus | Storrs |
Link | Research Website |
Google Scholar Link |
Brief Bio
Dr. Fuller is an associate professor of computer science and engineering at the University of Connecticut. I'm a co-director of the Connecticut Advanced Computing Center.
Prior to joining UConn he was a cryptographic researcher building secure systems at MIT Lincoln Laboratory from 2007-2016 in the Secure, Resilient Systems and Technology Group. He completed my Ph.D. at Boston University. While at BU he contributed to the BUSEC group. You can follow him on twitter at @fuzzycrypto
His primary research area is cryptography spanning from complexity/reduction-based cryptography, information theory, and applied cryptography necessary to deploy systems. Ideally, he was able to take a real problem, develop a theoretically sound approach, and work with others to implement a proof of concept.
The CSE and ECE departments jointly organize a security seminar. He also works with UConn's cyber security club. I encourage interested students to attend a meeting or talk to him about possible problems in cyber security.
- searching over encrypted data and designing authentication paradigms
- Secure Group Communication
- Searching over Encrypted Data
- Authentication from Noisy Sources
Reusable Fuzzy Extractors for Low-Entropy Distributions
R Canetti, B Fuller, O Paneth, L Reyzin, A Smith
Journal of Cryptology 34 (1), 1-33
|
SoK: Cryptographically Protected Database Search
B Fuller, M Varia, A Yerukhimovich, E Shen, A Hamlin, V Gadepally, ...
Proceedings of the 38th IEEE Symposium on Security and Privacy 1, 172-191
|
Computational fuzzy extractors
B Fuller, X Meng, L Reyzin
Information and Computation, 104602
|
A unified approach to deterministic encryption: New constructions and a connection to computational entropy
B Fuller, A O’Neill, L Reyzin
Journal of Cryptology 28 (3), 671-717
|
When are fuzzy extractors possible?
B Fuller, L Reyzin, A Smith
IEEE Transactions on Information Theory
|
Catching MPC cheaters: Identification and openability
R Cunningham, B Fuller, S Yakoubov
International Conference on Information Theoretic Security, 110-134
|
Cryptographic Authentication from the Iris
S Simhadri, J Steel, B Fuller
International Conference on Information Security, 465-485
|
Unconstrained iris segmentation using convolutional neural networks
S Ahmad, B Fuller
Computer Vision–ACCV 2018 Workshops: 14th Asian Conference on Computer …
|
FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise
C Jin, C Herder, L Ren, PH Nguyen, B Fuller, S Devadas, M van Dijk
Cryptography 1 (3), 23
|
Pseudoentropic isometries: A new framework for fuzzy extractor reusability
Q Alamélou, PE Berthier, C Cachet, S Cauchie, B Fuller, P Gaborit, ...
AsiaCCS
|
Computational entropy and information leakage (MA Thesis)
B Fuller, L Reyzin
Computer Science Department, Boston University
|
Thirdeye: Triplet based iris recognition without normalization
S Ahmad, B Fuller
2019 IEEE 10th International Conference on Biometrics Theory, Applications …
|
Iris Biometric Security Challenges and Possible Solutions: For your eyes only? Using the iris as a key
G Itkis, V Chandar, BW Fuller, JP Campbell, RK Cunningham
IEEE Signal Processing Magazine 32 (5), 42-53
|
Robust keys from physical unclonable functions
M Spain, B Fuller, K Ingols, R Cunningham
2014 IEEE International Symposium on Hardware-Oriented Security and Trust …
|
Resist: Reconstruction of irises from templates
S Ahmad, B Fuller
2020 IEEE International Joint Conference on Biometrics (IJCB), 1-10
|
Unifying leakage classes: Simulatable leakage and pseudoentropy
B Fuller, A Hamlin
Information Theoretic Security: 8th International Conference, ICITS 2015 …
|
Proximity Searchable Encryption for the Iris Biometric
C Cachet, S Ahmad, L Demarest, A Hamlin, B Fuller
Proceedings of the 2022 ACM on Asia Conference on Computer and …
|
Continuous-Source Fuzzy Extractors: Source uncertainty and security
B Fuller, L Peng
IEEE International Symposium on Information Theory
|
Public Key Cryptosystems with Noisy Secret Keys
C Herder, B Fuller, M van Dijk, S Devadas
|
Nonmalleable digital lockers and robust fuzzy extractors in the plain model
D Apon, C Cachet, B Fuller, P Hall, FH Liu
Advances in Cryptology–ASIACRYPT 2022: 28th International Conference on the …
|