Fuzzy sets and applications
UNIX password security—ten years later
CRYPTO '89 Proceedings on Advances in cryptology
Experimental quantum cryptography
Journal of Cryptology - Eurocrypt '90
A new identification scheme based on syndrome decoding
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Collisionful keyed hash functions with selectable collisions
Information Processing Letters
Decoding of Reed Solomon codes beyond the error-correction bound
Journal of Complexity
Decoding algebraic-geometric codes beyond the error-correction bound
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Password security: a case history
Communications of the ACM
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Handbook of Applied Cryptography
Handbook of Applied Cryptography
An Introduction to Error Correcting Codes with Applications
An Introduction to Error Correcting Codes with Applications
High Confidence Visual Recognition of Persons by a Test of Statistical Independence
IEEE Transactions on Pattern Analysis and Machine Intelligence
On password-based authenticated key exchange using collisionful hash functions
ACISP '96 Proceedings of the First Australasian Conference on Information Security and Privacy
On selectable collisionful hash functions
ACISP '96 Proceedings of the First Australasian Conference on Information Security and Privacy
Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Practical Quantum Oblivious Transfer
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
A Digital Signature Scheme Based on Linear Error-correcting Block Codes
ASIACRYPT '94 Proceedings of the 4th International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
Improved Decoding of Reed-Solomon and Algebraic-Geometric Codes
FOCS '98 Proceedings of the 39th Annual Symposium on Foundations of Computer Science
Efficient cryptographic protocols based on noisy channels
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Error-tolerant password recovery
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Protocols Using Keys from Faulty Data
Revised Papers from the 9th International Workshop on Security Protocols
Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices
Proceedings of the 11th USENIX Security Symposium
Secure smartcardbased fingerprint authentication
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Reusable cryptographic fuzzy extractors
Proceedings of the 11th ACM conference on Computer and communications security
Correcting errors without leaking partial information
Proceedings of the thirty-seventh annual ACM symposium on Theory of computing
A secure biometric authentication scheme based on robust hashing
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Microcoded coprocessor for embedded secure biometric authentication systems
CODES+ISSS '05 Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis
A Robust and Secure Media Signature Scheme for JPEG Images
Journal of VLSI Signal Processing Systems
Designs, Codes and Cryptography
Finding the original point set hidden among chaff
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
High security Iris verification system based on random secret integration
Computer Vision and Image Understanding
Combining Crypto with Biometrics Effectively
IEEE Transactions on Computers
Robust, short and sensitive authentication tags using secure sketch
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
IEEE Transactions on Pattern Analysis and Machine Intelligence
Privacy preserving multi-factor authentication with biometrics
Proceedings of the second ACM workshop on Digital identity management
Generating Cancelable Fingerprint Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
SODA '07 Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms
EURASIP Journal on Applied Signal Processing
Symmetric hash functions for secure fingerprint biometric systems
Pattern Recognition Letters
Distance-preserving pseudonymization for timestamps and spatial data
Proceedings of the 2007 ACM workshop on Privacy in electronic society
Cancellable biometrics and annotations on BioHash
Pattern Recognition
Privacy preserving multi-factor authentication with biometrics
Journal of Computer Security - The Second ACM Workshop on Digital Identity Management - DIM 2006
EURASIP Journal on Advances in Signal Processing
EURASIP Journal on Advances in Signal Processing
Protecting Secret Keys with Fuzzy Fingerprint Vault Based on a 3D Geometric Hash Table
ICANNGA '07 Proceedings of the 8th international conference on Adaptive and Natural Computing Algorithms, Part II
Efficient Helper Data Key Extractor on FPGAs
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
Towards practical biometric key generation with randomized biometric templates
Proceedings of the 15th ACM conference on Computer and communications security
Quantifying the security of preference-based authentication
Proceedings of the 4th ACM workshop on Digital identity management
Network Security Using Biometric and Cryptography
ACIVS '08 Proceedings of the 10th International Conference on Advanced Concepts for Intelligent Vision Systems
The best of both worlds: Applying secure sketches to cancelable biometrics
Science of Computer Programming
Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication
MDAI '08 Sabadell Proceedings of the 5th International Conference on Modeling Decisions for Artificial Intelligence
An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication
IWSEC '08 Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security
The practical subtleties of biometric key generation
SS'08 Proceedings of the 17th conference on Security symposium
Threshold-optimized decision-level fusion and its application to biometrics
Pattern Recognition
Additive Block Coding Schemes for Biometric Authentication with the DNA Data
Biometrics and Identity Management
Template Protection for On-Line Signature-Based Recognition Systems
Biometrics and Identity Management
Information Systems Frontiers
An Efficient and Flexible Scheme to Support Biometric-Based and Role-Based Access Control
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
A New Approach for Biometric Template Storage and Remote Authentication
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Systematic Construction of Iris-Based Fuzzy Commitment Schemes
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Robust Biometric Key Extraction Based on Iris Cryptosystem
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
A Security Analysis of Biometric Template Protection Schemes
ICIAR '09 Proceedings of the 6th International Conference on Image Analysis and Recognition
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
Geometric-Aligned Cancelable Fingerprint Templates
ICIAP '09 Proceedings of the 15th International Conference on Image Analysis and Processing
High security Iris verification system based on random secret integration
Computer Vision and Image Understanding
A channel coding approach for human authentication from gait sequences
IEEE Transactions on Information Forensics and Security
Challenges of implementing cyber-physical security solutions in body area networks
BodyNets '09 Proceedings of the Fourth International Conference on Body Area Networks
Biometric cryptosystem using function based on-line signature recognition
Expert Systems with Applications: An International Journal
Biometric quantization through detection rate optimized bit allocation
EURASIP Journal on Advances in Signal Processing
Expert Systems with Applications: An International Journal
Template protection for dynamic time warping based biometric signature authentication
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
Random translational transformation for changeable face verification
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
On supporting anonymity in a BAN biometric framework
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
Multibiometric cryptosystem: model structure and performance analysis
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Biometric systems: privacy and secrecy aspects
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Sorted index numbers for privacy preserving face recognition
EURASIP Journal on Advances in Signal Processing - Special issue on recent advances in biometric systems: a signal processing perspective
Biometric authentication using augmented face and random projection
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Multi-algorithm fusion with template protection
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Pitfall of the detection rate optimized bit allocation within template protection and a remedy
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Multi-biometrics based cryptographic key regeneration scheme
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Parameterized geometric alignment for minutiae-based fingerprint template protection
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Biometrics-based identifiers for digital identity management
Proceedings of the 9th Symposium on Identity and Trust on the Internet
A performance driven methodology for cancelable face templates generation
Pattern Recognition
A hybrid biometric cryptosystem for securing fingerprint minutiae templates
Pattern Recognition Letters
New shielding functions to enhance privacy and prevent misuse of biometric templates
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
Fuzzy face vault: how to implement fuzzy vault with weighted features
UAHCI'07 Proceedings of the 4th international conference on Universal access in human computer interaction: coping with diversity
An application of the Goldwasser-Micali cryptosystem to biometric authentication
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Soft generation of secure biometric keys
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Fingerprint hardening with randomly selected chaff minutiae
CAIP'07 Proceedings of the 12th international conference on Computer analysis of images and patterns
A hybrid approach for generating secure and discriminating face template
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security
Robust iris verification for key management
Pattern Recognition Letters
Physiological value-based efficient usable security solutions for body sensor networks
ACM Transactions on Sensor Networks (TOSN)
Extended private information retrieval and its application in biometrics authentications
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
The candidate key protocol for generating secret shared keys from similar sensor data streams
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
An alignment-free fingerprint cryptosystem based on fuzzy vault scheme
Journal of Network and Computer Applications
Minutiae and modified Biocode fusion for fingerprint-based key generation
Journal of Network and Computer Applications
Cancelable fingerprint templates using minutiae-based bit-strings
Journal of Network and Computer Applications
A formal study of the privacy concerns in biometric-based remote authentication schemes
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
RSA moduli with a predetermined portion: techniques and applications
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
An authentication protocol with encrypted biometric data
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
Multi-factor authenticated key exchange
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Fingerprint template protection using fuzzy vault
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
Extending match-on-card to local biometric identification
BioID_MultiComm'09 Proceedings of the 2009 joint COST 2101 and 2102 international conference on Biometric ID management and multimodal communication
Classification based revocable biometric identity code generation
BioID_MultiComm'09 Proceedings of the 2009 joint COST 2101 and 2102 international conference on Biometric ID management and multimodal communication
Cancelable templates for sequence-based biometrics with application to on-line signature recognition
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans - Special issue on recent advances in biometrics
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans - Special issue on recent advances in biometrics
PSKA: usable and secure key agreement scheme for body area networks
IEEE Transactions on Information Technology in Biomedicine
Fingerprint image processing and minutiae extraction for fuzzy vault
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
An effective crypto-biometric system for secure email in wireless environment
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
Information leakage in fuzzy commitment schemes
IEEE Transactions on Information Forensics and Security
Negative databases for biometric data
Proceedings of the 12th ACM workshop on Multimedia and security
eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics
Proceedings of the 12th ACM workshop on Multimedia and security
An analysis of random projection for changeable and privacy-preserving biometric verification
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
A novel algorithm of fingerprint encryption using minutiae-based transformation
Pattern Recognition Letters
Secure sketch for multiple secrets
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
IH'10 Proceedings of the 12th international conference on Information hiding
Template protection for security enhancement of a biometric face authentication system
Proceedings of the 2011 conference on Neural Nets WIRN10: Proceedings of the 20th Italian Workshop on Neural Nets
A key binding system based on n-nearest minutiae structure of fingerprint
Pattern Recognition Letters
Privacy preserving facial and fingerprint multi-biometric authentication
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Increasing error tolerance in biometric systems
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
A simple scheme for constructing fault-tolerant passwords from biometric data
EURASIP Journal on Information Security
Quality of service regulation in secure body area networks: system modeling and adaptation methods
EURASIP Journal on Wireless Communications and Networking - Special issue on towards the connected body: advances in body communications
ICCOMP'10 Proceedings of the 14th WSEAS international conference on Computers: part of the 14th WSEAS CSCC multiconference - Volume I
BioID'11 Proceedings of the COST 2101 European conference on Biometrics and ID management
Eigen-model projections for protected on-line signature recognition
BioID'11 Proceedings of the COST 2101 European conference on Biometrics and ID management
Pair-polar coordinate-based cancelable fingerprint templates
Pattern Recognition
Fuzzy identity based signature with applications to biometric authentication
Computers and Electrical Engineering
Fingerprint image processing and fuzzy vault implementation
Journal of Mobile Multimedia
A Proposal for a Privacy-preserving National Identity Card
Transactions on Data Privacy
Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security
Journal of Network and Computer Applications
Context-based security: state of the art, open research topics and a case study
CASEMANS '11 Proceedings of the 5th ACM International Workshop on Context-Awareness for Self-Managing Systems
Multi-biometrics based crypto-biometric session key generation and sharing protocol
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
A review on body area networks security for healthcare
ISRN Communications and Networking
Entropy of audio fingerprints for unobtrusive device authentication
CONTEXT'11 Proceedings of the 7th international and interdisciplinary conference on Modeling and using context
Electronic Commerce Research and Applications
Fuzzy cyclic random mapping for face recognition based on MD-RiuLBP feature
CCBR'11 Proceedings of the 6th Chinese conference on Biometric recognition
Identities, forgeries and disguises
International Journal of Information Technology and Management
Secure sketch for biometric templates
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Biometric cryptosystem using online signatures
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
On fuzzy syndrome hashing with LDPC coding
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
Symmetric hash functions for fingerprint minutiae
ICAPR'05 Proceedings of the Third international conference on Pattern Recognition and Image Analysis - Volume Part II
Generation of replaceable cryptographic keys from dynamic handwritten signatures
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Read-proof hardware from protective coatings
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Approximate message authentication and biometric entity authentication
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Secure biometric authentication for weak computational devices
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Cancelable key-based fingerprint templates
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Automatic alignment of fingerprint features for fuzzy fingerprint vault
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Fingerprint template protection with minutiae-based bit-string for security and privacy preserving
Expert Systems with Applications: An International Journal
Robust key extraction from physical uncloneable functions
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Practical biometric authentication with template protection
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
An effective biometric cryptosystem combining fingerprints with error correction codes
Expert Systems with Applications: An International Journal
A verifiable fingerprint vault scheme
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Secure remote authentication using biometric data
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Robust fuzzy extractors and authenticated key agreement from close secrets
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
A crypto-biometric scheme based on iris-templates with fuzzy extractors
Information Sciences: an International Journal
Hiding secret points amidst chaff
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Biometric-Based non-transferable anonymous credentials
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Towards a privacy-preserving national identity card
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Random number generation based on fingerprints
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Privacy preserving key generation for iris biometrics
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Secure iris recognition based on local intensity variations
ICIAR'10 Proceedings of the 7th international conference on Image Analysis and Recognition - Volume Part II
The challenges raised by the privacy-preserving identity card
Cryptography and Security
Biometric Security from an Information-Theoretical Perspective
Foundations and Trends in Communications and Information Theory
WISA'11 Proceedings of the 12th international conference on Information Security Applications
Iris-Biometric fuzzy commitment schemes under signal degradation
ICISP'12 Proceedings of the 5th international conference on Image and Signal Processing
Security analysis of key binding biometric cryptosystems
ICISP'12 Proceedings of the 5th international conference on Image and Signal Processing
SIRIS: secure IRIS authentication system
Proceedings of the Fifth International Conference on Security of Information and Networks
"3D Face": biometric template protection for 3d face recognition
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Biometric fuzzy extractors made practical: a proposal based on fingercodes
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Robust extraction of secret bits from minutiae
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Fuzzy extractors for minutiae-based fingerprint authentication
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm
Future Generation Computer Systems
Security performance evaluation for biometric template protection techniques
International Journal of Biometrics
Biometric cryptosystem based on discretized fingerprint texture descriptors
Expert Systems with Applications: An International Journal
PalmHash Code vs. PalmPhasor Code
Neurocomputing
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Cancelable fusion using social network analysis
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
POSTER: Secure authentication from facial attributeswith no privacy loss
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Heart-to-heart (H2H): authentication for implanted medical devices
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Bias-based modeling and entropy analysis of PUFs
Proceedings of the 3rd international workshop on Trustworthy embedded devices
Proceedings of the 3rd international workshop on Trustworthy embedded devices
Towards standardizing trusted evidence of identity
Proceedings of the 2013 ACM workshop on Digital identity management
SIMBAD'13 Proceedings of the Second international conference on Similarity-Based Pattern Recognition
Wireless body area networks: challenges, trends and emerging technologies
BodyNets '13 Proceedings of the 8th International Conference on Body Area Networks
A bio-cryptographic system based on offline signature images
Information Sciences: an International Journal
Secure outsourced computation of iris matching
Journal of Computer Security
A practical implementation of fuzzy fingerprint vault for smart cards
Journal of Intelligent Manufacturing
Two-factor face authentication using matrix permutation transformation and a user password
Information Sciences: an International Journal
Hi-index | 0.01 |
We combine well-known techniques from the areas of error-correcting codes and cryptography to achieve a new type of cryptographic primitive that we refer to as a fuzzy commitment scheme. Like a conventional cryptographic commitment scheme, our fuzzy commitment scheme is both concealing and binding: it is infeasible for an attacker to learn the committed value, and also for the committer to decommit a value in more than one way. In a conventional scheme, a commitment must be opened using a unique witness, which acts, essentially, as a decryption key. By contrast, our scheme is fuzzy in the sense that it accepts a witness that is close to the original encrypting witness in a suitable metric, but not necessarily identical.This characteristic of our fuzzy commitment scheme makes it useful for applications such as biometric authentication systems, in which data is subject to random noise. Because the scheme is tolerant of error, it is capable of protecting biometric data just as conventional cryptographic techniques, like hash functions, are used to protect alphanumeric passwords. This addresses a major outstanding problem in the theory of biometric authentication. We prove the security characteristics of our fuzzy commitment scheme relative to the properties of an underlying cryptographic hash function.