메뉴 건너뛰기




Volumn 4, Issue 5, 2011, Pages 548-562

Identification with encrypted biometric data

Author keywords

Biometrics; Identification; Privacy; Searchable encryption

Indexed keywords

CRYPTOGRAPHY; DATA PRIVACY; DIGITAL STORAGE; IDENTIFICATION (CONTROL SYSTEMS);

EID: 79955005687     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.206     Document Type: Article
Times cited : (32)

References (51)
  • 1
    • 70449490810 scopus 로고    scopus 로고
    • Error-Tolerant Searchable Encryption. IEEE International Conference on Communication (ICC'09)
    • Bringer J, Chabanne H, Kindarji B. Error-Tolerant Searchable Encryption. IEEE International Conference on Communication (ICC'09), 2009.
    • (2009)
    • Bringer, J.1    Chabanne, H.2    Kindarji, B.3
  • 2
    • 43949116287 scopus 로고    scopus 로고
    • Biometric template security. EURASIP Journal on Advances in Signal Processing (Jan. 2008), pp -
    • Jain AK, Nandakumar K, Nagar A. Biometric template security. EURASIP Journal on Advances in Signal Processing (Jan. 2008), pp 1-17, 2008.
    • (2008) , pp. 1-17
    • Jain, A.K.1    Nandakumar, K.2    Nagar, A.3
  • 3
    • 84863702244 scopus 로고    scopus 로고
    • Biometric template security: challenges and solutions. Proceedings of 13th European Signal Processing Conference (EUSIPCO), Antalya, Turkey
    • Jain AK, Ross A, Uludag U. Biometric template security: challenges and solutions. Proceedings of 13th European Signal Processing Conference (EUSIPCO), Antalya, Turkey, 2005.
    • (2005)
    • Jain, A.K.1    Ross, A.2    Uludag, U.3
  • 5
    • 0027700869 scopus 로고
    • High confidence visual recognition of persons by a test of statistical independence
    • Daugman J. High confidence visual recognition of persons by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence 1993; 15(11): 1148-1161.
    • (1993) IEEE Transactions on Pattern Analysis and Machine Intelligence , vol.15 , Issue.11 , pp. 1148-1161
    • Daugman, J.1
  • 6
    • 0032675768 scopus 로고    scopus 로고
    • Fingercode: a filterbank for fingerprint representation and matching. IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'99)
    • Jain AK, Prabhakar S, Hong L, Pankanti S. Fingercode: a filterbank for fingerprint representation and matching. IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'99) - Volume 2, pp 2187, 2009.
    • (2009) , vol.2 , pp. 2187
    • Jain, A.K.1    Prabhakar, S.2    Hong, L.3    Pankanti, S.4
  • 7
    • 26444507172 scopus 로고    scopus 로고
    • Practical biometric authentication with template protection
    • Kanade T, Jain AK, Ratha NK (eds). Springer: Berlin/Heidelberg
    • Tuyls P, Akkermans AHM, Kevenaar TAM, Schrijen GJ, Bazen AM, Veldhuis RNJ. Practical biometric authentication with template protection. In AVBPA, Vol. 3546, Kanade T, Jain AK, Ratha NK (eds). Springer: Berlin/Heidelberg, 2005; 436-446.
    • (2005) AVBPA , vol.3546 , pp. 436-446
    • Tuyls, P.1    Akkermans, A.H.M.2    Kevenaar, T.A.M.3    Schrijen, G.J.4    Bazen, A.M.5    Veldhuis, R.N.J.6
  • 8
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Cachin and Camenisch [49]
    • Dodis Y, Reyzin L, Smith A. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Cachin and Camenisch [49] 523-540.
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 9
    • 0033281339 scopus 로고    scopus 로고
    • A fuzzy commitment scheme. ACM Conference on Computer and Communications Security
    • Juels A, Wattenberg M. A fuzzy commitment scheme. ACM Conference on Computer and Communications Security, 1999; 28-36.
    • (1999) , pp. 28-36
    • Juels, A.1    Wattenberg, M.2
  • 10
    • 34548074162 scopus 로고    scopus 로고
    • Protecting biometric templates with sketch: theory and practice
    • DOI: 10.1109/TIFS.2007.902022
    • Sutcu Y, Li Q, Memon N. Protecting biometric templates with sketch: theory and practice. Information Forensics and Security, IEEE Transactions on 2007; 2(3): 503-512. DOI: 10.1109/TIFS.2007.902022
    • (2007) Information Forensics and Security, IEEE Transactions on , vol.2 , Issue.3 , pp. 503-512
    • Sutcu, Y.1    Li, Q.2    Memon, N.3
  • 11
    • 37849009414 scopus 로고    scopus 로고
    • Hardening fingerprint fuzzy vault using password
    • Li SZ (eds). Springer: Berlin/Heidelberg
    • Nandakumar K, Nagar A, Jain AK. Hardening fingerprint fuzzy vault using password. In ICB, Lecture Notes in Computer Science, Vol. 4642, Lee SW, Li SZ (eds). Springer: Berlin/Heidelberg, 2007; 927-937.
    • (2007) ICB, Lecture Notes in Computer Science , vol.4642 , pp. 927-937
    • Nandakumar, K.1    Nagar, A.2    Jain, A.K.3    Lee, S.W.4
  • 12
    • 33747624401 scopus 로고    scopus 로고
    • Combining crypto with biometrics effectively
    • DOI: 10.1109/TC.2006.138
    • Hao F, Anderson R, Daugman J. Combining crypto with biometrics effectively. Computers, IEEE Transactions on 2006; 55(9): 1081-1088. DOI: 10.1109/TC.2006.138
    • (2006) Computers, IEEE Transactions on , vol.55 , Issue.9 , pp. 1081-1088
    • Hao, F.1    Anderson, R.2    Daugman, J.3
  • 15
    • 56349139535 scopus 로고    scopus 로고
    • The best of both worlds: applying secure sketches to cancelable biometrics
    • Special Issue on Security and Trust).
    • Bringer J, Chabanne H, Kindarji B. The best of both worlds: applying secure sketches to cancelable biometrics. Science of Computer Programming 2008; 74(1-2): 43-51 (Special Issue on Security and Trust).
    • (2008) Science of Computer Programming , vol.74 , Issue.1-2 , pp. 43-51
    • Bringer, J.1    Chabanne, H.2    Kindarji, B.3
  • 16
    • 69949156569 scopus 로고    scopus 로고
    • Securing fingerprint template: fuzzy vault with minutiae descriptors
    • Nagar A, Nandakumar K, Jain AK. Securing fingerprint template: fuzzy vault with minutiae descriptors. ICPR, IEEE, 2008; 1-4.
    • (2008) ICPR, IEEE , pp. 1-4
    • Nagar, A.1    Nandakumar, K.2    Jain, A.K.3
  • 17
    • 34748815127 scopus 로고    scopus 로고
    • An application of the Naccache-Stern knapsack cryptosystem to biometric authentication
    • Bringer J, Chabanne H, Tang Q. An application of the Naccache-Stern knapsack cryptosystem to biometric authentication. AutoID, IEEE, 2007; 180-185.
    • (2007) AutoID, IEEE , pp. 180-185
    • Bringer, J.1    Chabanne, H.2    Tang, Q.3
  • 20
    • 33746092442 scopus 로고    scopus 로고
    • Efficient binary conversion for Paillier encrypted values
    • Vaudenay S (ed.). Springer: Berlin/Heidelberg
    • Schoenmakers B, Tuyls P. Efficient binary conversion for Paillier encrypted values. In EUROCRYPT, Vol. 4004, Vaudenay S (ed.). Springer: Berlin/Heidelberg, 2006; 522-537.
    • (2006) EUROCRYPT , vol.4004 , pp. 522-537
    • Schoenmakers, B.1    Tuyls, P.2
  • 21
    • 41549110945 scopus 로고    scopus 로고
    • A formal study of the privacy concerns in biometric-based remote authentication schemes
    • Susilo W (eds). Springer: Berlin/Heidelberg
    • Tang Q, Bringer J, Chabanne H, Pointcheval D. A formal study of the privacy concerns in biometric-based remote authentication schemes. In ISPEC, Lecture Notes in Computer Science, Vol. 4991, Chen L, Mu Y, Susilo W (eds). Springer: Berlin/Heidelberg, 2008; 56-70.
    • (2008) ISPEC, Lecture Notes in Computer Science , vol.4991 , pp. 56-70
    • Tang, Q.1    Bringer, J.2    Chabanne, H.3    Pointcheval, D.4    Chen, L.5    Mu, Y.6
  • 23
    • 45449114377 scopus 로고    scopus 로고
    • An authentication protocol with encrypted biometric data
    • Vaudenay S (ed.), Springer: Berlin/Heidelberg
    • Bringer J, Chabanne H. An authentication protocol with encrypted biometric data. In AFRICACRYPT, Lecture Notes in Computer Science, Vol. 5023, Vaudenay S (ed.), Springer: Berlin/Heidelberg, 2008; 109-124.
    • (2008) AFRICACRYPT, Lecture Notes in Computer Science , vol.5023 , pp. 109-124
    • Bringer, J.1    Chabanne, H.2
  • 24
    • 58049132058 scopus 로고    scopus 로고
    • An application of the boneh and shacham group signature scheme to biometric authentication
    • Fujisaki E (eds). Springer: Berlin/Heidelberg
    • Bringer J, Chabanne H, Pointcheval D, Zimmer S. An application of the boneh and shacham group signature scheme to biometric authentication. In IWSEC, Lecture Notes in Computer Science, Vol. 5312, Matsuura K, Fujisaki E (eds). Springer: Berlin/Heidelberg, 2008; 219-230.
    • (2008) IWSEC, Lecture Notes in Computer Science , vol.5312 , pp. 219-230
    • Bringer, J.1    Chabanne, H.2    Pointcheval, D.3    Zimmer, S.4    Matsuura, K.5
  • 25
    • 24644489770 scopus 로고    scopus 로고
    • Nearest neighbors in high-dimensional spaces
    • 2nd edition), Chapter 39, O'Rourke J (eds). CRC Press LLC, Boca Raton, FL, Avril
    • Indyk P. Nearest neighbors in high-dimensional spaces. Handbook of Discrete and Computational Geometry (2nd edition), Chapter 39, Goodman JE, O'Rourke J (eds). CRC Press LLC, Boca Raton, FL, Avril 2004.
    • (2004) Handbook of Discrete and Computational Geometry
    • Indyk, P.1    Goodman, J.E.2
  • 27
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search. Cachin and Camenisch[49]
    • Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G. Public key encryption with keyword search. Cachin and Camenisch[49]; 506-522.
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 28
    • 79954989867 scopus 로고    scopus 로고
    • Secure indexes. Cryptology ePrint Archive, Report 2003/216
    • Goh EJ. Secure indexes. Cryptology ePrint Archive, Report 2003/216 2003.
    • (2003)
    • Goh, E.J.1
  • 29
    • 33751031560 scopus 로고    scopus 로고
    • New constructions and practical applications for private stream searching (extended abstract)
    • Bethencourt J, Song DX, Waters B. New constructions and practical applications for private stream searching (extended abstract). IEEE Symposium on Security and Privacy, 2006; 132-139.
    • (2006) IEEE Symposium on Security and Privacy , pp. 132-139
    • Bethencourt, J.1    Song, D.X.2    Waters, B.3
  • 30
    • 33746214783 scopus 로고    scopus 로고
    • Efficient conjunctive keyword search on encrypted data storage system
    • Lioy A (eds). Springer: Berlin/Heidelberg
    • Byun JW, Lee DH, Lim J. Efficient conjunctive keyword search on encrypted data storage system. In EuroPKI, Vol. 4043, Atzeni AS, Lioy A (eds). Springer: Berlin/Heidelberg, 2006; 184-196.
    • (2006) EuroPKI , vol.4043 , pp. 184-196
    • Byun, J.W.1    Lee, D.H.2    Lim, J.3    Atzeni, A.S.4
  • 31
    • 33745922362 scopus 로고    scopus 로고
    • Public key encryption with keyword search based on K-resilient IBE
    • In (3), Choo H (eds). Springer: Berlin/Heidelberg
    • Khader D. Public key encryption with keyword search based on K-resilient IBE. In ICCSA (3), Vol. 3982, Gavrilova ML, Gervasi O, Kumar V, Tan CJK, Taniar D, Laganà A, Mun Y, Choo H (eds). Springer: Berlin/Heidelberg, 2006; 298-308.
    • (2006) ICCSA , vol.3982 , pp. 298-308
    • Khader, D.1    Gavrilova, M.L.2    Gervasi, O.3    Kumar, V.4    Tan, C.J.K.5    Taniar, D.6    Laganà, A.7    Mun, Y.8
  • 32
    • 35248839565 scopus 로고    scopus 로고
    • Efficient conjunctive keyword-searchable encryption. AINA Workshops (1), IEEE Computer Society).
    • Ryu EK, Takagi T. Efficient conjunctive keyword-searchable encryption. AINA Workshops (1), 2007; 409-414 (IEEE Computer Society).
    • (2007) , pp. 409-414
    • Ryu, E.K.1    Takagi, T.2
  • 33
    • 38049138213 scopus 로고    scopus 로고
    • Skeith III WE. Public key encryption that allows PIR queries
    • Menezes A (ed.). Springer
    • Boneh D, Kushilevitz E, Ostrovsky R, Skeith III WE. Public key encryption that allows PIR queries. In CRYPTO, Vol. 4622, Menezes A (ed.). Springer, 2007; 50-67.
    • (2007) CRYPTO , vol.4622 , pp. 50-67
    • Boneh, D.1    Kushilevitz, E.2    Ostrovsky, R.3
  • 34
    • 0031644241 scopus 로고    scopus 로고
    • Approximate nearest neighbors: towards removing the curse of dimensionality
    • Indyk P, Motwani R. Approximate nearest neighbors: towards removing the curse of dimensionality. Symposium on the Theory of Computing, 1998; 604-613.
    • (1998) Symposium on the Theory of Computing , pp. 604-613
    • Indyk, P.1    Motwani, R.2
  • 37
    • 37549058056 scopus 로고    scopus 로고
    • Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions
    • Andoni A, Indyk P. Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. Communications of the ACM 2008; 51(1): 117-122.
    • (2008) Communications of the ACM , vol.51 , Issue.1 , pp. 117-122
    • Andoni, A.1    Indyk, P.2
  • 38
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • Bloom BH. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 1970; 13(7): 422-426.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 40
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • El Gamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. CRYPTO 1984; 10-18.
    • (1984) CRYPTO , pp. 10-18
    • El Gamal, T.1
  • 41
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology, Proceedings of EUROCRYPT'99, LCNS, Springer: Berlin/Heidelberg
    • Paillier P. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology, Proceedings of EUROCRYPT'99, LCNS, Vol. 1592, Springer: Berlin/Heidelberg, 1999; 223-238.
    • (1999) , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 43
    • 0031624875 scopus 로고    scopus 로고
    • Protecting data privacy in private information retrieval schemes
    • Gertner Y, Ishai Y, Kushilevitz E, Malkin T. Protecting data privacy in private information retrieval schemes. STOC 1998; 151-160.
    • (1998) STOC , pp. 151-160
    • Gertner, Y.1    Ishai, Y.2    Kushilevitz, E.3    Malkin, T.4
  • 46
    • 84947618820 scopus 로고    scopus 로고
    • A survey on private information retrieval.
    • Gasarch WI. A survey on private information retrieval.
    • Gasarch, W.I.1
  • 47
    • 0030714231 scopus 로고    scopus 로고
    • Private information storage (extended abstract). STOC
    • Ostrovsky R, Shoup V. Private information storage (extended abstract). STOC 1997; 294-303.
    • (1997) , pp. 294-303
    • Ostrovsky, R.1    Shoup, V.2
  • 48
    • 79955030361 scopus 로고    scopus 로고
    • Skeith III WE. Algebraic lower bounds for computing on encrypted data. Cryptology ePrint Archive, Report 2007/064
    • Ostrovsky R, Skeith III WE. Algebraic lower bounds for computing on encrypted data. Cryptology ePrint Archive, Report 2007/064 2007.
    • (2007)
    • Ostrovsky, R.1
  • 49
    • 79955012614 scopus 로고    scopus 로고
    • Camenisch J (eds)., International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2-6 May 2004, Proceedings, LCNS, Springer: Berlin/Heidelberg
    • Cachinquery C, Camenisch J (eds). Advances in Cryptology-EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2-6 May 2004, Proceedings, LCNS, Vol. 3027, Springer: Berlin/Heidelberg, 2004.
    • (2004) Advances in Cryptology-EUROCRYPT 2004 , vol.3027
    • Cachinquery, C.1
  • 50
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A. How to share a secret. Communications of the ACM 1979; 22(11): 612-613.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.