메뉴 건너뛰기




Volumn , Issue , 2010, Pages 231-240

Privacy-preserving fingercode authentication

Author keywords

biometric based identification; fingercode; homomorphic encryption; multi party computation; privacy preserving protocol

Indexed keywords

BANDWIDTH SAVINGS; BIOMETRIC IDENTIFICATIONS; BIOMETRIC SYSTEMS; CRYPTOGRAPHIC PRIMITIVES; DISTANCE COMPUTATION; FINGERCODE; FINGERPRINT IMAGES; FINGERPRINT READER; HOMOMORPHIC ENCRYPTION; HOMOMORPHIC-ENCRYPTIONS; IDENTIFICATION PROTOCOL; MATCHING PROCESS; MULTIPARTY COMPUTATION; PRIVACY PRESERVING; PRIVACY-PRESERVING PROTOCOLS; PROTOCOL COMPLEXITY; THRESHOLDING;

EID: 78149266544     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1854229.1854270     Document Type: Conference Paper
Times cited : (174)

References (22)
  • 1
    • 77954610725 scopus 로고    scopus 로고
    • Efficient privacy-preserving face recognition
    • ICISC '09: Proceedings of the 12th Annual International Conference on Information Security and Cryptology, ser. Springer-Verlag, December 2-4, full version available at
    • A. Sadeghi, T. Schneider, and I. Wehrenberg, "Efficient privacy-preserving face recognition," in ICISC '09: Proceedings of the 12th Annual International Conference on Information Security and Cryptology, ser. LNCS, vol. 5984. Springer-Verlag, December 2-4, 2009, pp. 235-253, full version available at http://eprint.iacr.org/2009/507.
    • (2009) LNCS , vol.5984 , pp. 235-253
    • Sadeghi, A.1    Schneider, T.2    Wehrenberg, I.3
  • 6
    • 0031233235 scopus 로고    scopus 로고
    • An identity-authentication system using fingerprints
    • A. Jain, L. Hong, S. Pankanti, and R. Bolle, "An identity-authentication system using fingerprints." Proc. IEEE, 85, (9), pp. 1364-1388, 1997.
    • (1997) Proc. IEEE , vol.85 , Issue.9 , pp. 1364-1388
    • Jain, A.1    Hong, L.2    Pankanti, S.3    Bolle, R.4
  • 7
    • 0034135212 scopus 로고    scopus 로고
    • Effect of resolution and image quality on combined optical and neural network fingerprint matching
    • C. L. Wilson, C. Watson, , and E. Peak, "Effect of resolution and image quality on combined optical and neural network fingerprint matching," Putt. Recognit., 33, (Z), pp. 317-331, 2000.
    • (2000) Putt. Recognit. , vol.33 , Issue.Z , pp. 317-331
    • Wilson, C.L.1    Watson, C.2    Peak, E.3
  • 8
    • 0033076475 scopus 로고    scopus 로고
    • Fingerprint feature extraction using gabor filters
    • C. Lee and S. Wang, "Fingerprint feature extraction using gabor filters," Eleclron. Lett., 35, (4), pp. 288-290, 1999.
    • (1999) Eleclron. Lett. , vol.35 , Issue.4 , pp. 288-290
    • Lee, C.1    Wang, S.2
  • 9
    • 33845461931 scopus 로고    scopus 로고
    • An efficient algorithm for fingercode-based biometric identification
    • H.-W. Sun, K.-Y. Lam, M. Gu, and J.-G. Sun, "An efficient algorithm for fingercode-based biometric identification," in OTM Workshops (1), 2006, pp. 469-478.
    • (2006) OTM Workshops (1) , pp. 469-478
    • Sun, H.-W.1    Lam, K.-Y.2    Gu, M.3    Sun, J.-G.4
  • 12
    • 78149232330 scopus 로고    scopus 로고
    • Nist recommendation for key management
    • ser. August
    • "Nist recommendation for key management," ser. NIST Special Publication, vol. 800-57, August 2005.
    • (2005) NIST Special Publication , vol.800 , Issue.57
  • 13
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • EUROCRYPT'99, ser. J. Stern, Ed., Springer-Verlag, Berlin, Germany, May
    • P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in EUROCRYPT'99, ser. LNCS, J. Stern, Ed., vol. 1592. Springer-Verlag, Berlin, Germany, May 1999, pp. 223-238.
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 14
    • 38149074802 scopus 로고    scopus 로고
    • Efficient and secure comparison for on-line auctions
    • ACISP, ser. J. Pieprzyk, H. Ghodosi, and E. Dawson, Eds., Springer
    • I. Damgård, M. Geisler, and M. Krøigard, "Efficient and secure comparison for on-line auctions," in ACISP, ser. Lecture Notes in Computer Science, J. Pieprzyk, H. Ghodosi, and E. Dawson, Eds., vol. 4586. Springer, 2007, pp. 416-430.
    • (2007) Lecture Notes in Computer Science , vol.4586 , pp. 416-430
    • Damgård, I.1    Geisler, M.2    Krøigard, M.3
  • 15
    • 0022188127 scopus 로고
    • A robust and verifiable cryptographically secure election scheme
    • IEEE Computer Society Press, Oct.
    • J. Cohen and M. Fischer, "A robust and verifiable cryptographically secure election scheme," in 26th FOCS. IEEE Computer Society Press, Oct. 1985.
    • (1985) 26th FOCS
    • Cohen, J.1    Fischer, M.2
  • 16
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • CRYPTO'84, ser. G. R. Blakley and D. Chaum, Eds., Springer-Verlag, Berlin, Germany, Aug.
    • T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," in CRYPTO'84, ser. LNCS, G. R. Blakley and D. Chaum, Eds., vol. 196. Springer-Verlag, Berlin, Germany, Aug. 1985, pp. 10-18.
    • (1985) LNCS , vol.196 , pp. 10-18
    • ElGamal, T.1
  • 20
    • 72449131818 scopus 로고    scopus 로고
    • Secure two-party computation is practical
    • ASIACRYPT, ser. M. Matsui, Ed., Springer
    • B. Pinkas, T. Schneider, N. Smart, and S. Williams, "Secure two-party computation is practical," in ASIACRYPT, ser. Lecture Notes in Computer Science, M. Matsui, Ed., vol. 5912. Springer, 2009, pp. 250-267.
    • (2009) Lecture Notes in Computer Science , vol.5912 , pp. 250-267
    • Pinkas, B.1    Schneider, T.2    Smart, N.3    Williams, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.