Privacy-preserving fingerprint authentication resistant to hill-climbing attacks
From MaRDI portal
Publication:2807195
DOI10.1007/978-3-319-31301-6_3zbMATH Open1396.94105OpenAlexW2417169526MaRDI QIDQ2807195FDOQ2807195
Authors: Haruna Higo, Toshiyuki Isshiki, Kengo Mori, Satoshi Obana
Publication date: 19 May 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-31301-6_3
Recommendations
- Financial Cryptography and Data Security
- Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication
- An Authentication Protocol with Encrypted Biometric Data
- Lattice-Based Secure Biometric Authentication for Hamming Distance
- Secure Biometric Authentication with Improved Accuracy
Cites Work
- Theory of Cryptography
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Advances in Cryptology - EUROCRYPT 2004
- Foundations of Cryptography
- A fuzzy vault scheme
- Advances in Cryptology - EUROCRYPT 2004
- Handbook of Fingerprint Recognition
- Cryptographically-secure and efficient remote cancelable biometrics based on public-key homomorphic encryption
- An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
- An Authentication Protocol with Encrypted Biometric Data
- Private fingerprint matching
- Secure Biometric Authentication with Improved Accuracy
Cited In (10)
- On the leakage of information in biometric authentication
- Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication
- An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
- Title not available (Why is that?)
- Spoofing protection for fingerprint scanner by fusing ridge signal and valley noise
- A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third Parties
- Private fingerprint matching
- A fingerprint encryption scheme based on irreversible function and secure authentication
- Cloud-assisted secure biometric identification with sub-linear search efficiency
- Financial Cryptography and Data Security
This page was built for publication: Privacy-preserving fingerprint authentication resistant to hill-climbing attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2807195)