메뉴 건너뛰기




Volumn , Issue , 2011, Pages 123-141

Biometric identification paradigm: Towards privacy and confidentiality protection

Author keywords

Biometrics; Identification; Privacy; Searchable encryption

Indexed keywords


EID: 81855166982     PISSN: None     EISSN: None     Source Type: Book    
DOI: None     Document Type: Chapter
Times cited : (12)

References (36)
  • 1
    • 71549143789 scopus 로고    scopus 로고
    • Biometric identification over encrypted data made feasible
    • In Atul Prakash and Indranil Gupta, editors, ICISS, volume 5905 of Lecture Notes in Computer Science, Springer
    • Michael Adjedj, Julien Bringer, Hervé Chabanne, and Bruno Kindarji. Biometric identification over encrypted data made feasible. In Atul Prakash and Indranil Gupta, editors, ICISS, volume 5905 of Lecture Notes in Computer Science, pages 86-100. Springer, 2009.
    • (2009) , pp. 86-100
    • Adjedj, M.1    Bringer, J.2    Chabanne, H.3    Kindarji, B.4
  • 2
    • 37549058056 scopus 로고    scopus 로고
    • Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions
    • Alexandr Andoni and Indyk Piotr. Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. Commun. ACM, 51(1):117-122, 2008.
    • (2008) Commun. ACM , vol.51 , Issue.1 , pp. 117-122
    • Andoni, A.1    Piotr, I.2
  • 3
    • 33751031560 scopus 로고    scopus 로고
    • New constructions and practical applications for private stream searching (extended abstract)
    • IEEE Computer Society
    • John Bethencourt, Dawn X. Song, and Brent Waters. New constructions and practical applications for private stream searching (extended abstract). In IEEE Symposium on Security and Privacy, pages 132-139. IEEE Computer Society, 2006.
    • (2006) IEEE Symposium on Security and Privacy , pp. 132-139
    • Bethencourt, J.1    Song, D.X.2    Waters, B.3
  • 4
    • 0014814325 scopus 로고
    • Bloom. Space/time trade-offs in hash coding with allowable errors
    • Burton H. Bloom. Space/time trade-offs in hash coding with allowable errors. Commun. ACM, 13(7):422-426, 1970.
    • (1970) Commun. ACM , vol.13 , Issue.7 , pp. 422-426
    • Burton, H.1
  • 6
    • 38049138213 scopus 로고    scopus 로고
    • Public key encryption that allows PIR queries
    • editor, CRYPTO, Springer
    • Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, and William. E. Skeith III. Public key encryption that allows PIR queries. In Alfred Menezes, editor, CRYPTO, volume 4622, pages 50-67. Springer, 2007.
    • (2007) Alfred Menezes , vol.4622 , pp. 50-67
    • Boneh, D.1    Kushilevitz, E.2    Ostrovsky, R.3    Skeith III, W.E.4
  • 7
    • 45449114377 scopus 로고    scopus 로고
    • An authentication protocol with encrypted biometric data
    • In Serge Vaudenay, editor, of Lecture Notes in Computer Science, Springer
    • Julien Bringer and Hervé Chabanne. An authentication protocol with encrypted biometric data. In Serge Vaudenay, editor, AFRICACRYPT, volume 5023 of Lecture Notes in Computer Science, pages 109-124. Springer, 2008.
    • (2008) AFRICACRYPT , vol.5023 , pp. 109-124
    • Bringer, J.1    Chabanne, H.2
  • 9
    • 38149070898 scopus 로고    scopus 로고
    • An application of the goldwassermicali cryptosystem to biometric authentication
    • In Josef Pieprzyk, Hossein Ghodosi, and Ed Dawson, editors, of Lecture Notes in Computer Science, Springer
    • Julien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang, and Sébastien Zimmer. An application of the goldwassermicali cryptosystem to biometric authentication. In Josef Pieprzyk, Hossein Ghodosi, and Ed Dawson, editors, ACISP, volume 4586 of Lecture Notes in Computer Science, pages 96-106. Springer, 2007.
    • (2007) ACISP , vol.4586 , pp. 96-106
    • Bringer, J.1    Chabanne, H.2    Izabachène, M.3    Pointcheval, D.4    Tang, Q.5    Zimmer, S.6
  • 10
    • 77952047954 scopus 로고    scopus 로고
    • Extending match-on-card to local biometric identification
    • In Julian Fiérrez-Aguilar, Javier Ortega-Garcia, Anna Esposito, Andrzej Drygajlo, and Marcos Fáundez-Zanuy, editors, of Lecture Notes in Computer Science, Springer
    • Julien Bringer, Hervé Chabanne, Tom A. M. Kevenaar, and Bruno Kindarji. Extending match-on-card to local biometric identification. In Julian Fiérrez-Aguilar, Javier Ortega-Garcia, Anna Esposito, Andrzej Drygajlo, and Marcos Fáundez-Zanuy, editors, COST 2101/2102 Conference, volume 5707 of Lecture Notes in Computer Science, pages 178-186. Springer, 2009.
    • (2009) COST 2101/2102 Conference , vol.5707 , pp. 178-186
    • Bringer, J.1    Chabanne, H.2    Kevenaar, T.A.M.3    Kindarji, B.4
  • 11
    • 56349139535 scopus 로고    scopus 로고
    • The best of both worlds: Applying secure sketches to cancelable biometrics
    • Julien Bringer, Hervé Chabanne, and Bruno Kindarji. The best of both worlds: Applying secure sketches to cancelable biometrics. Sci. Comput. Program., 74(1-2):43-51, 2008.
    • (2008) Sci. Comput. Program. , vol.74 , Issue.1-2 , pp. 43-51
    • Bringer, J.1    Chabanne, H.2    Kindarji, B.3
  • 13
    • 79955005687 scopus 로고    scopus 로고
    • Identification with encrypted biometric data. Security Comm
    • Networks, doi:10.1002/sec.206
    • Julien Bringer, Hervé Chabanne, and Bruno Kindarji. Identification with encrypted biometric data. Security Comm. Networks, 2010. doi:10.1002/sec.206.
    • (2010)
    • Bringer, J.1    Chabanne, H.2    Kindarji, B.3
  • 14
    • 38349176849 scopus 로고    scopus 로고
    • Extended private information retrieval and its application in biometrics authentications
    • In Feng Bao, San Ling, Tatsuaki Okamoto, HuaxiongWang, and Chaoping Xing, editors, of Lecture Notes in Computer Science, Springer
    • Julien Bringer, Hervé Chabanne, David Pointcheval, and Qiang Tang. Extended private information retrieval and its application in biometrics authentications. In Feng Bao, San Ling, Tatsuaki Okamoto, HuaxiongWang, and Chaoping Xing, editors, CANS, volume 4856 of Lecture Notes in Computer Science, pages 175-193. Springer, 2007.
    • (2007) CANS , vol.4856 , pp. 175-193
    • Bringer, J.1    Chabanne, H.2    Pointcheval, D.3    Tang, Q.4
  • 15
    • 58049132058 scopus 로고    scopus 로고
    • An application of the boneh and shacham group signature scheme to biometric authentication
    • In Kanta Matsuura and Eiichiro Fujisaki, editors, of Lecture Notes in Computer Science, Springer
    • Julien Bringer, Hervé Chabanne, David Pointcheval, and Sébastien Zimmer. An application of the boneh and shacham group signature scheme to biometric authentication. In Kanta Matsuura and Eiichiro Fujisaki, editors, IWSEC, volume 5312 of Lecture Notes in Computer Science, pages 219-230. Springer, 2008.
    • (2008) IWSEC , vol.5312 , pp. 219-230
    • Bringer, J.1    Chabanne, H.2    Pointcheval, D.3    Zimmer, S.4
  • 16
    • 84889576817 scopus 로고    scopus 로고
    • Advances in Cryptology -EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques
    • Interlaken, Switzerland, May 2-6, 2004, Proceedings, volume, of Lecture Notes in Computer Science. Springer
    • Christian Cachin and Jan Camenisch, editors. Advances in Cryptology -EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, volume 3027 of Lecture Notes in Computer Science. Springer, 2004.
    • (2004) , vol.3027
    • Cachin, C.1    Camenisch, J.2
  • 17
    • 69949132178 scopus 로고    scopus 로고
    • Binary biometric representation through pairwise polar quantization
    • In Massimo Tistarelli and Mark S. Nixon, editors, of Lecture Notes in Computer Science, Springer
    • Chun Chen and Raymond N. J. Veldhuis. Binary biometric representation through pairwise polar quantization. In Massimo Tistarelli and Mark S. Nixon, editors, ICB, volume 5558 of Lecture Notes in Computer Science, pages 72-81. Springer, 2009.
    • (2009) ICB , vol.5558 , pp. 72-81
    • Chen, C.1    Veldhuis, R.N.J.2
  • 19
    • 0027700869 scopus 로고
    • High confidence visual recognition of persons by a test of statistical independence
    • John Daugman. High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. Pattern Anal. Mach. Intell., 15(11):1148-1161, 1993.
    • (1993) IEEE Trans. Pattern Anal. Mach. Intell. , vol.15 , Issue.11 , pp. 1148-1161
    • Daugman, J.1
  • 20
    • 84892043078 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Yevgeniy Dodis, Leonid Reyzin, and Adam Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Cachin and Camenisch [16], pages 523-540.
    • Cachin and Camenisch , vol.16 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 21
    • 84892052411 scopus 로고    scopus 로고
    • Gasarch. A survey on private information retrieval
    • William I. Gasarch. A survey on private information retrieval. http://www.cs.umd.edu/ gasarch/pir/pir.html.
    • William, I.1
  • 22
    • 33244488406 scopus 로고    scopus 로고
    • Secure indexes
    • Cryptology ePrint Archive, Report 2003/216
    • Eu-Jin Goh. Secure indexes. Cryptology ePrint Archive, Report 2003/216, 2003. http://eprint.iacr.org/2003/216/.
    • (2003)
    • Goh, E.-J.1
  • 23
    • 44049109285 scopus 로고    scopus 로고
    • A fast search algorithm for a large fuzzy database. Information Forensics and Security
    • June
    • Feng Hao, John Daugman, and Piotr Zielinski. A fast search algorithm for a large fuzzy database. Information Forensics and Security, IEEE Transactions on, 3(2):203-212, June 2008.
    • (2008) IEEE Transactions on , vol.3 , Issue.2 , pp. 203-212
    • Hao, F.1    Daugman, J.2    Zielinski, P.3
  • 24
    • 84957626176 scopus 로고
    • Proactive secret sharing or: How to cope with perpetual leakage
    • In Don Coppersmith, editor, of Lecture Notes in Computer Science, Springer
    • Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, and Moti Yung. Proactive secret sharing or: How to cope with perpetual leakage. In Don Coppersmith, editor, CRYPTO, volume 963 of Lecture Notes in Computer Science, pages 339-352. Springer, 1995.
    • (1995) CRYPTO , vol.963 , pp. 339-352
    • Herzberg, A.1    Jarecki, S.2    Krawczyk, H.3    Yung, M.4
  • 25
    • 50649106124 scopus 로고    scopus 로고
    • Handbook of Biometrics
    • Springer-Verlag New York, Inc., Secaucus, NJ, USA
    • Anil K. Jain, Patrick Flynn, and Arun A. Ross. Handbook of Biometrics. Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2007.
    • (2007)
    • Jain, A.K.1    Flynn, P.2    Ross, A.A.3
  • 26
    • 0013143822 scopus 로고    scopus 로고
    • Fingercode: A filterbank for fingerprint representation and matching
    • IEEE Computer Society
    • Anil K. Jain, Salil Prabhakar, Lin Hong, and Sharath Pankanti. Fingercode: A filterbank for fingerprint representation and matching. In CVPR, pages 2187-. IEEE Computer Society, 1999.
    • (1999) CVPR , pp. 2187
    • Jain, A.K.1    Prabhakar, S.2    Hong, L.3    Pankanti, S.4
  • 29
    • 0031636499 scopus 로고    scopus 로고
    • Efficient search for approximate nearest neighbor in high dimensional spaces
    • Eyal Kushilevitz, Rafail Ostrovsky, and Yuval Rabani. Efficient search for approximate nearest neighbor in high dimensional spaces. In Symposium on the Theory Of Computing, pages 614-623, 1998.
    • (1998) Symposium on the Theory Of Computing , pp. 614-623
    • Kushilevitz, E.1    Ostrovsky, R.2    Rabani, Y.3
  • 30
    • 78149275738 scopus 로고    scopus 로고
    • Encyclopedia of Biometrics
    • Springer US
    • Stan Z. Li and Anil K. Jain, editors. Encyclopedia of Biometrics. Springer US, 2009.
    • (2009)
    • Li, S.Z.1    Jain, A.K.2
  • 31
    • 0030714231 scopus 로고    scopus 로고
    • Private information storage (extended abstract)
    • Rafail Ostrovsky and Victor Shoup. Private information storage (extended abstract). In STOC, pages 294-303, 1997.
    • (1997) STOC , pp. 294-303
    • Ostrovsky, R.1    Shoup, V.2
  • 32
    • 24644489770 scopus 로고    scopus 로고
    • Nearest neighbors in high-dimensional spaces
    • In Jacob E. Goodman and Joseph O'Rourke, editors, chapter 39. CRC Press, 2rd edition
    • Indyk Piotr. Nearest neighbors in high-dimensional spaces. In Jacob E. Goodman and Joseph O'Rourke, editors, Handbook of Discrete and Computational Geometry, chapter 39. CRC Press, 2004. 2rd edition.
    • (2004) Handbook of Discrete and Computational Geometry
    • Piotr, I.1
  • 33
    • 0031644241 scopus 로고    scopus 로고
    • Approximate nearest neighbors: Towards removing the curse of dimensionality
    • Indyk Piotr and Motwani Rajeev. Approximate nearest neighbors: Towards removing the curse of dimensionality. In Symposium on the Theory Of Computing, pages 604-613, 1998.
    • (1998) Symposium on the Theory Of Computing , pp. 604-613
    • Piotr, I.1    Rajeev, M.2
  • 34
    • 0018545449 scopus 로고
    • How to share a secret
    • Adi Shamir. How to share a secret. Commun. ACM, 22(11):612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 36
    • 41549110945 scopus 로고    scopus 로고
    • A formal study of the privacy concerns in biometric-based remote authentication schemes
    • In Liqun Chen, Yi Mu, and Willy Susilo, editors, of Lecture Notes in Computer Science, Springer
    • Qiang Tang, Julien Bringer, Hervé Chabanne, and David Pointcheval. A formal study of the privacy concerns in biometric-based remote authentication schemes. In Liqun Chen, Yi Mu, and Willy Susilo, editors, ISPEC, volume 4991 of Lecture Notes in Computer Science, pages 56-70. Springer, 2008.
    • (2008) ISPEC , vol.4991 , pp. 56-70
    • Tang, Q.1    Bringer, J.2    Chabanne, H.3    Pointcheval, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.