BETA: biometric-enabled threshold authentication
From MaRDI portal
Publication:2061958
DOI10.1007/978-3-030-75248-4_11zbMath1479.94289OpenAlexW3164824882MaRDI QIDQ2061958
Sikhar Patranabis, Payman Mohassel, Saikrishna Badrinarayanan, Shashank Agrawal, Pratyay Mukherjee
Publication date: 21 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-75248-4_11
Related Items
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Smooth projective hashing and two-message oblivious transfer
- Two-round multiparty secure computation from minimal assumptions
- \(k\)-round multiparty computation from \(k\)-round oblivious transfer via garbled interactive circuits
- Fuzzy password-authenticated key exchange
- Threshold cryptosystems from threshold fully homomorphic encryption
- BETA: biometric-enabled threshold authentication
- Noninteractive zero knowledge for NP from (Plain) Learning With Errors
- Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- A minimal model for secure computation (extended abstract)
- Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts
- A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data
- Function Secret Sharing
- A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
- Multi-key FHE from LWE, Revisited
- A Simpler Variant of Universally Composable Security for Standard Multiparty Computation
- A Framework for Efficient and Composable Oblivious Transfer
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- Privacy-Preserving Stream Aggregation with Fault Tolerance
- Foundations of Homomorphic Secret Sharing
- A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third Parties
- Ad Hoc PSM Protocols: Secure Computation Without Coordination
- Advances in Cryptology - EUROCRYPT 2004
- Fuzzy Identity-Based Encryption
- Two Round Multiparty Computation via Multi-key FHE