메뉴 건너뛰기




Volumn , Issue , 2012, Pages 257-264

Faster secure computation for biometric identification using filtering

Author keywords

[No Author keywords available]

Indexed keywords

BIOMETRIC IDENTIFICATIONS; BIOMETRIC RECOGNITION; FILTERING TECHNIQUE; IRIS IDENTIFICATION; NEW CONSTRUCTIONS; PHASE BASED; SECURE COMPUTATION; SECURE MULTI-PARTY COMPUTATION; SECURITY PROPERTIES;

EID: 84866777273     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICB.2012.6199817     Document Type: Conference Paper
Times cited : (27)

References (30)
  • 1
    • 71549143789 scopus 로고    scopus 로고
    • Biometric identification over encrypted data made feasible
    • M. Adjedj, J. Bringer, H. Chabanne, and B. Kindarji. Biometric identification over encrypted data made feasible. In ICISS, pages 86-100, 2009.
    • (2009) ICISS , pp. 86-100
    • Adjedj, M.1    Bringer, J.2    Chabanne, H.3    Kindarji, B.4
  • 2
    • 84866779632 scopus 로고    scopus 로고
    • Secure and efficient protocols for iris and fingerprint identification
    • M. Blanton and P. Gasti. Secure and efficient protocols for iris and fingerprint identification. In ESORICS, 2011.
    • (2011) ESORICS
    • Blanton, M.1    Gasti, P.2
  • 3
    • 45449114377 scopus 로고    scopus 로고
    • An authentication protocol with encrypted biometric data
    • J. Bringer and H. Chabanne. An authentication protocol with encrypted biometric data. In AFRICACRYPT, pages 109-124, 2008.
    • (2008) AFRICACRYPT , pp. 109-124
    • Bringer, J.1    Chabanne, H.2
  • 4
    • 81855166982 scopus 로고    scopus 로고
    • Biometric identification paradigm: Towards privacy and confidentiality protection
    • E. R. Nichols, editor. Nova Science Publishers
    • J. Bringer and H. Chabanne. Biometric identification paradigm: Towards privacy and confidentiality protection. In E. R. Nichols, editor, Biometrics: Theory, Applications, and Issues. Nova Science Publishers, 2011.
    • (2011) Biometrics: Theory, Applications, and Issues
    • Bringer, J.1    Chabanne, H.2
  • 6
    • 0027700869 scopus 로고
    • High confidence visual recognition of persons by a test of statistical independence
    • J. Daugman. High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. on Pattern Analysis and Machine Intelligence, 15(11), 1993.
    • (1993) IEEE Trans. on Pattern Analysis and Machine Intelligence , vol.15 , Issue.11
    • Daugman, J.1
  • 7
    • 0036487317 scopus 로고    scopus 로고
    • The importance of being random: Statistical principles of iris recognition
    • J. Daugman. The importance of being random: statistical principles of iris recognition. Pattern Recognition, 36(2), 2003.
    • (2003) Pattern Recognition , vol.36 , Issue.2
    • Daugman, J.1
  • 12
    • 79958010869 scopus 로고    scopus 로고
    • Efficient secure two-party protocols: Techniques and constructions
    • Springer-Verlag
    • C. Hazay and Y. Lindell. Efficient Secure Two-Party Protocols: Techniques and Constructions. Information Security and Cryptography Series, Springer-Verlag, 2010.
    • (2010) Information Security and Cryptography Series
    • Hazay, C.1    Lindell, Y.2
  • 14
    • 84923318201 scopus 로고    scopus 로고
    • Efficient privacypreserving biometric identification
    • Y. Huang, L. Malka, D. Evans, and J. Katz. Efficient privacypreserving biometric identification. In NDSS, 2011.
    • (2011) NDSS
    • Huang, Y.1    Malka, L.2    Evans, D.3    Katz, J.4
  • 15
    • 84869443834 scopus 로고    scopus 로고
    • Improved garbled circuit building blocks and applications to auctions and computing minima
    • V. Kolesnikov, A.-R. Sadeghi, and T. Schneider. Improved garbled circuit building blocks and applications to auctions and computing minima. In CANS, 2009.
    • (2009) CANS
    • Kolesnikov, V.1    Sadeghi, A.-R.2    Schneider, T.3
  • 16
    • 49049099825 scopus 로고    scopus 로고
    • Improved garbled circuit: Free xor gates and applications
    • V. Kolesnikov and T. Schneider. Improved garbled circuit: Free xor gates and applications. In ICALP (2), 2008.
    • (2008) ICALP , Issue.2
    • Kolesnikov, V.1    Schneider, T.2
  • 17
    • 64249101946 scopus 로고    scopus 로고
    • A proof of security of Yao's protocol for two-party computation
    • Y. Lindell and B. Pinkas. A proof of security of Yao's protocol for two-party computation. J. Cryptology, 22(2), 2009.
    • (2009) J. Cryptology , vol.22 , pp. 2
    • Lindell, Y.1    Pinkas, B.2
  • 18
    • 79959312553 scopus 로고    scopus 로고
    • An oblivious transfer protocol with log-squared communication
    • H. Lipmaa. An oblivious transfer protocol with log-squared communication. In ISC, 2005.
    • (2005) ISC
    • Lipmaa, H.1
  • 20
    • 22044454088 scopus 로고    scopus 로고
    • Computationally secure oblivious transfer
    • M. Naor and B. Pinkas. Computationally secure oblivious transfer. J. Cryptology, 18(1), 2005.
    • (2005) J. Cryptology , vol.18 , Issue.1
    • Naor, M.1    Pinkas, B.2
  • 21
    • 48649087855 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST). Iris Challenge Evaluation. http://iris.nist.gov/ICE, 2005.
    • (2005) Iris Challenge Evaluation
  • 22
    • 84866782232 scopus 로고    scopus 로고
    • U. of Virginia and U. of Maryland
    • U. of Virginia and U. of Maryland. Might be evil. www.mightbeevil.com.
  • 28
    • 0031236835 scopus 로고    scopus 로고
    • Automated iris recognition: An emerging biometric technology
    • R. Wildes. Automated iris recognition: An emerging biometric technology. Proceedings of the IEEE, 85(9), 1997.
    • (1997) Proceedings of the IEEE , vol.85 , Issue.9
    • Wildes, R.1
  • 30
    • 0003113271 scopus 로고
    • How to generate and exchange secrets (extended abstract)
    • A. C.-C. Yao. How to generate and exchange secrets (extended abstract). In FOCS, 1986.
    • (1986) FOCS
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.