Biometric authentication is a protocol which verifies a user’s authority by comparing her biometric with the pre-enrolled biometric template stored in the server. Biometric authentication is convenient and reliable; however, it also brings privacy issues since biometric information is irrevocable when exposed. In this paper, we propose a new user-centric secure biometric authentication protocol for Hamming distance. The biometric data is always encrypted so that the verification server learns nothing about biometric information beyond the Hamming distance between enrolled and queried templates. To achieve this, we construct a single-key function-hiding inner product functional encryption for binary strings whose security is based on a vari...
Bringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their f...
Abstract. Biometric authentication over public networks leads to a variety of privacy issues that ne...
Nowadays bio-metric authentication systems are widely used in order to provide authentication withou...
© 2021, Springer Nature Switzerland AG.Biometric authentication is a protocol which verifies a user’...
Part 1: Modern CryptographyInternational audienceAmong many approaches for privacy-preserving biomet...
Concerns of privacy, template security and efficiency of biometric authentication systems have recei...
This research focuses on user authentication, especially the privacy-preserving biometrics authentic...
In this paper, we study the security of two recently proposed privacy-preserving biometric authentic...
Abstract. Biometric authentication based on facial image, fingerprint, palm print, iris, retina, or ...
The continuous dependence on electronic media has radically changed our interactions, many of which ...
and Patey proposed two biometric authentication schemes be-tween a prover and a verifier where the v...
Abstract. Biometric data offer a potential source of high-entropy, secret information that can be us...
In biometric authentication protocols, a user is authenticated or granted access to a service if her...
peer reviewedBringer et al. proposed two cryptographic protocols for the computation of Hamming dist...
For biometrics, a.k.a. biometric authentication, the server checks whether the biometric sample (fro...
Bringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their f...
Abstract. Biometric authentication over public networks leads to a variety of privacy issues that ne...
Nowadays bio-metric authentication systems are widely used in order to provide authentication withou...
© 2021, Springer Nature Switzerland AG.Biometric authentication is a protocol which verifies a user’...
Part 1: Modern CryptographyInternational audienceAmong many approaches for privacy-preserving biomet...
Concerns of privacy, template security and efficiency of biometric authentication systems have recei...
This research focuses on user authentication, especially the privacy-preserving biometrics authentic...
In this paper, we study the security of two recently proposed privacy-preserving biometric authentic...
Abstract. Biometric authentication based on facial image, fingerprint, palm print, iris, retina, or ...
The continuous dependence on electronic media has radically changed our interactions, many of which ...
and Patey proposed two biometric authentication schemes be-tween a prover and a verifier where the v...
Abstract. Biometric data offer a potential source of high-entropy, secret information that can be us...
In biometric authentication protocols, a user is authenticated or granted access to a service if her...
peer reviewedBringer et al. proposed two cryptographic protocols for the computation of Hamming dist...
For biometrics, a.k.a. biometric authentication, the server checks whether the biometric sample (fro...
Bringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their f...
Abstract. Biometric authentication over public networks leads to a variety of privacy issues that ne...
Nowadays bio-metric authentication systems are widely used in order to provide authentication withou...