메뉴 건너뛰기




Volumn 38, Issue 2, 2006, Pages 237-257

A fuzzy vault scheme

Author keywords

Authentication; Cryptography; Error correting codes

Indexed keywords

CODES (SYMBOLS); FUZZY SETS; IMAGE PROCESSING; IMAGE RETRIEVAL; INFORMATION ANALYSIS; SECURITY OF DATA;

EID: 30844458593     PISSN: 09251022     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10623-005-6343-z     Document Type: Article
Times cited : (605)

References (30)
  • 1
    • 84858659532 scopus 로고
    • A digital signature scheme based on linear error-correcting block codes
    • Josef Pieprzyk and Reihanah Safavi-Naini (eds.), Springer-Verlag LNCS no. 917
    • M. Alabbadi and S. B. Wicker, A digital signature scheme based on linear error-correcting block codes. In Josef Pieprzyk and Reihanah Safavi-Naini (eds.), Asiacrypt '94, Springer-Verlag (1994) LNCS no. 917, pp. 238-248.
    • (1994) Asiacrypt '94 , pp. 238-248
    • Alabbadi, M.1    Wicker, S.B.2
  • 3
    • 0013056120 scopus 로고
    • Practical quantum oblivious transfer protocols
    • J. Feigenbaum (ed.), Springer-Verlag. LNCS no. 576
    • C. H. Bennett, G. Brassard, C. Crépeau and M.-H. Skubiszewska, Practical quantum oblivious transfer protocols. In J. Feigenbaum (ed.), Crypto '91, Springer-Verlag (1991). LNCS no. 576, pp. 351-366.
    • (1991) Crypto '91 , pp. 351-366
    • Bennett, C.H.1    Brassard, G.2    Crépeau, C.3    Skubiszewska, M.-H.4
  • 5
    • 84948951675 scopus 로고    scopus 로고
    • Noisy polynomial interpolation and noisy Chinese remaindering
    • B. Preneel (ed.), LNCS no. 1807
    • D. Bleichenbacher and P. Nyuyen, Noisy polynomial interpolation and noisy Chinese remaindering. In B. Preneel (ed.), Eurocrypt '00, (2000) LNCS no. 1807, pp. 53-69.
    • (2000) Eurocrypt '00 , pp. 53-69
    • Bleichenbacher, D.1    Nyuyen, P.2
  • 6
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password-authenticated key exchange using Diffle-Hellman
    • B. Preneel (ed.), Springer-Verlag LNCS no. 1807
    • V. Boyko, P. MacKenzie, and S. Patel, Provably secure password-authenticated key exchange using Diffle-Hellman. In B. Preneel (ed.), Eurocrypt '00, Springer-Verlag (2000) LNCS no. 1807, pp. 156-171.
    • (2000) Eurocrypt '00 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 7
    • 84957356475 scopus 로고    scopus 로고
    • Efficient cryptographic protocols based on noisy channels
    • W. Fumy (ed.), Springer-Verlag, LNCS no. 1233
    • C. Crépeau, Efficient cryptographic protocols based on noisy channels. In W. Fumy (ed.), Eurocrypt '97, Springer-Verlag, (1997) LNCS no. 1233, pp. 306-317.
    • (1997) Eurocrypt '97 , pp. 306-317
    • Crépeau, C.1
  • 12
    • 0034140877 scopus 로고    scopus 로고
    • Protecting secret keys with personal entropy
    • February
    • C. Ellison, C. Hall, R. Milbert and B. Schneier, Protecting Secret Keys with Personal Entropy, J. Fut. Comput. Sys. Vol. 16, no. 4 (2000, February) pp. 311-318.
    • (2000) J. Fut. Comput. Sys. , vol.16 , Issue.4 , pp. 311-318
    • Ellison, C.1    Hall, C.2    Milbert, R.3    Schneier, B.4
  • 15
    • 0032311617 scopus 로고    scopus 로고
    • Improved decoding of Reed-Solomon and algebraic-geometric codes
    • IEEE Computer Society
    • V. Guruswami and M. Sudan, Improved decoding of Reed-Solomon and algebraic-geometric codes, In FOCS '98, IEEE Computer Society (1998), pp. 28-39.
    • (1998) FOCS '98 , pp. 28-39
    • Guruswami, V.1    Sudan, M.2
  • 16
    • 84957694404 scopus 로고    scopus 로고
    • Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree
    • H. Krawczyk (ed.), Springer-Verlag LNCS no. 1462
    • T. Jakobsen, Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree, In H. Krawczyk (ed.), Crypto '98, Springer-Verlag (1998) LNCS no. 1462, pp. 212-222.
    • (1998) Crypto '98 , pp. 212-222
    • Jakobsen, T.1
  • 17
    • 84955606093 scopus 로고    scopus 로고
    • Proving with knowing: On oblivious, agnostic, and blind-folded provers
    • N. Koblitz (ed.), Springer-Verlag LNCS no. 1109
    • M. Jakobsson and M. Yung, Proving with knowing: On oblivious, agnostic, and blind-folded provers, In N. Koblitz (ed.), Crypto '96, Springer-Verlag (1996), LNCS no. 1109, pp. 186-200.
    • (1996) Crypto '96 , pp. 186-200
    • Jakobsson, M.1    Yung, M.2
  • 21
    • 84937740421 scopus 로고
    • Shift register synthesis and BCH decoding
    • J. L. Massey, Shift register synthesis and BCH decoding. IEEE Trans. Inform. Theory, Vol. 15, no. 1 (1969) pp. 122-127.
    • (1969) IEEE Trans. Inform. Theory , vol.15 , Issue.1 , pp. 122-127
    • Massey, J.L.1
  • 22
    • 0003777826 scopus 로고
    • A public-key cryptosystem based on algebraic coding theory
    • Jet Propulsion Laboratory, Pasadena
    • R. J. McEliece, A public-key cryptosystem based on algebraic coding theory, Technical Report DSN progress report 42-44, Jet Propulsion Laboratory, Pasadena (1978).
    • (1978) Technical Report DSN Progress Report , vol.42-44
    • McEliece, R.J.1
  • 24
    • 84982943258 scopus 로고
    • Non-interactive and information-theoretic secure verifiable secret sharing
    • J. Feigenbaum (ed.), Springer-Verlag, LNCS no. 576
    • T. Pedersen, Non-interactive and information-theoretic secure verifiable secret sharing. In J. Feigenbaum (ed.), Crypto '91, Springer-Verlag (1991), LNCS no. 576, pp. 129-140.
    • (1991) Crypto '91 , pp. 129-140
    • Pedersen, T.1
  • 25
    • 0000808175 scopus 로고
    • Encoding and error-correction procedures for Bose-Chaudhuri codes
    • W. W. Peterson, Encoding and error-correction procedures for Bose-Chaudhuri codes, IEEE Trans. Inform. Theory, Vol. IT-60 (1960) pp. 459-470.
    • (1960) IEEE Trans. Inform. Theory , vol.IT-60 , pp. 459-470
    • Peterson, W.W.1
  • 26
    • 0035879575 scopus 로고    scopus 로고
    • A fair and efficient solution to the sociaset millionaires' problem
    • July
    • B. Schoenmakers, F. Boudot and J. Traoré, A fair and efficient solution to the sociaset millionaires' problem, Discrete Appl. Math. Vol. 111 (2001, July) pp. 23-36.
    • (2001) Discrete Appl. Math. , vol.111 , pp. 23-36
    • Schoenmakers, B.1    Boudot, F.2    Traoré, J.3
  • 27
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, How to share a secret, Commun. ACM, Vol. 22 (1979) pp. 612-613.
    • (1979) Commun. ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 29
  • 30
    • 84955595109 scopus 로고
    • A new identification scheme based on syndrome decoding
    • D.R. Stinson (ed.), Springer-Verlag, LNCS no. 773
    • J. Stern, A new identification scheme based on syndrome decoding, In D.R. Stinson (ed.), Crypto '93, Springer-Verlag (1993), LNCS no. 773, pp. 13-21.
    • (1993) Crypto '93 , pp. 13-21
    • Stern, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.