Model Inversion Attacks Meet Cryptographic Fuzzy Extractors