We present a privacy preserving protocol for fingerprint-based authentication. We consider a scenario where a client equipped with a fingerprint reader is interested into learn-ing if the acquired fingerprint belongs to the database of authorized entities managed by a server. For security, it is required that the client does not learn anything on the database and the server should not get any information about the requested biometry and the outcome of the match-ing process. The proposed protocol follows a multi-party computation approach and makes extensive use of homomor-phic encryption as underlying cryptographic primitive. To keep the protocol complexity as low as possible, a particular representation of fingerprint images, named Fingerc...
The deployment of ngerprint recognition systems has always raised concerns related to personal priva...
Part 1: Security and Privacy ServicesInternational audienceIn this paper, we propose an efficient bi...
Currently, there are three approaches to limit disclosure of databases containing confidential data:...
We present a privacy preserving protocol for fingerprint-based authentication. We consider a scenari...
We present a privacy preserving protocol for fingerprint-based authentication. We consider a scenari...
We present a privacy preserving protocol for fingerprint-based authentication. We consider a scenari...
We present a privacy preserving protocol for fingerprint-based authentication. We consider a scenari...
We present a privacy preserving protocol for fingerprint-based authentication. We consider a scenari...
We present a privacy preserving protocol for fingerprint-based authentication. We consider a scenari...
Abstract — The privacy protection of the biometric data is an important research topic, especially i...
The privacy protection of the biometric data is an important research topic, especially in the case ...
The privacy protection of the biometric data is an important research topic, especially in the case ...
The privacy protection of the biometric data is an important research topic, especially in the case ...
The privacy protection of the biometric data is an important research topic, especially in the case ...
The privacy protection of the biometric data is an important research topic, especially in the case ...
The deployment of ngerprint recognition systems has always raised concerns related to personal priva...
Part 1: Security and Privacy ServicesInternational audienceIn this paper, we propose an efficient bi...
Currently, there are three approaches to limit disclosure of databases containing confidential data:...
We present a privacy preserving protocol for fingerprint-based authentication. We consider a scenari...
We present a privacy preserving protocol for fingerprint-based authentication. We consider a scenari...
We present a privacy preserving protocol for fingerprint-based authentication. We consider a scenari...
We present a privacy preserving protocol for fingerprint-based authentication. We consider a scenari...
We present a privacy preserving protocol for fingerprint-based authentication. We consider a scenari...
We present a privacy preserving protocol for fingerprint-based authentication. We consider a scenari...
Abstract — The privacy protection of the biometric data is an important research topic, especially i...
The privacy protection of the biometric data is an important research topic, especially in the case ...
The privacy protection of the biometric data is an important research topic, especially in the case ...
The privacy protection of the biometric data is an important research topic, especially in the case ...
The privacy protection of the biometric data is an important research topic, especially in the case ...
The privacy protection of the biometric data is an important research topic, especially in the case ...
The deployment of ngerprint recognition systems has always raised concerns related to personal priva...
Part 1: Security and Privacy ServicesInternational audienceIn this paper, we propose an efficient bi...
Currently, there are three approaches to limit disclosure of databases containing confidential data:...