Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication
From MaRDI portal
Publication:3540937
Recommendations
- An Authentication Protocol with Encrypted Biometric Data
- Lattice-Based Secure Biometric Authentication for Hamming Distance
- Privacy-preserving fingerprint authentication resistant to hill-climbing attacks
- A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third Parties
- Secure Remote Authentication Using Biometric Data
Cites work
- scientific article; zbMATH DE number 1303150 (Why is no real title available?)
- scientific article; zbMATH DE number 1088224 (Why is no real title available?)
- scientific article; zbMATH DE number 1406779 (Why is no real title available?)
- A fuzzy vault scheme
- Efficient proofs that a committed number lies in an interval
- Handbook of Fingerprint Recognition
Cited in
(8)- Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication
- Sorted index numbers for privacy preserving face recognition
- scientific article; zbMATH DE number 2089662 (Why is no real title available?)
- Lattice-Based Secure Biometric Authentication for Hamming Distance
- Packed homomorphic encryption based on ideal lattices and its application to biometrics
- Privacy-preserving fingerprint authentication resistant to hill-climbing attacks
- Cryptographically-secure and efficient remote cancelable biometrics based on public-key homomorphic encryption
- Leakage-resilient biometric-based remote user authentication with fuzzy extractors
This page was built for publication: Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3540937)