Theory of linear and integer programming
Theory of linear and integer programming
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society
Handbook of Fingerprint Recognition
Handbook of Fingerprint Recognition
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
Reusable cryptographic fuzzy extractors
Proceedings of the 11th ACM conference on Computer and communications security
Designs, Codes and Cryptography
Fuzzy extractors for continuous distributions
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
EURASIP Journal on Advances in Signal Processing
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
SIAM Journal on Computing
Information Sciences: an International Journal
Tongue shape classification by geometric features
Information Sciences: an International Journal
Signcryption from randomness recoverable public key encryption
Information Sciences: an International Journal
Time-selective convertible undeniable signatures with short conversion receipts
Information Sciences: an International Journal
Activity-oriented access control to ubiquitous hospital information and services
Information Sciences: an International Journal
Information Sciences: an International Journal
Certificateless threshold signature scheme from bilinear maps
Information Sciences: an International Journal
Information Sciences: an International Journal
Forward-secure identity-based signature: Security notions and construction
Information Sciences: an International Journal
New receipt-free voting scheme using double-trapdoor commitment
Information Sciences: an International Journal
Secure remote authentication using biometric data
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
An adaptive classification system for video-based face recognition
Information Sciences: an International Journal
Biometric fuzzy extractors made practical: a proposal based on fingercodes
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Fuzzy extractors for minutiae-based fingerprint authentication
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Biometric key binding: fuzzy vault based on iris images
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Iris recognition based on bidimensional empirical mode decomposition and fractal dimension
Information Sciences: an International Journal
Consistency analysis on orientation features for fast and accurate palmprint identification
Information Sciences: an International Journal
Hi-index | 0.07 |
One of the most important uses of Biometrics is the identification and authentication of individuals using one or several of their physiognomical or behavioral features. Moreover, Biometrics offers a good option to assist Cryptography for confidentiality, encryption, and decryption of messages by using some biometric traits. In this paper, a crypto-biometric scheme, based on fuzzy extractors, by using iris templates, is proposed, i.e., we propose a new system in order to permit a user to retrieve a secret or a previously saved key by using her own biometric template. The properties and efficiency for selecting the most useful parameters to provide a high level of security in the scheme are thoroughly analyzed.