Experimental quantum cryptography
Journal of Cryptology - Eurocrypt '90
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Protecting secret keys with personal entropy
Future Generation Computer Systems - Special issue on security on the Web
Communications of the ACM
Error-tolerant password recovery
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design
Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design
Practical Quantum Oblivious Transfer
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
A New Identification Scheme Based on Syndrome Decoding
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
A Digital Signature Scheme Based on Linear Error-correcting Block Codes
ASIACRYPT '94 Proceedings of the 4th International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
Improved Decoding of Reed-Solomon and Algebraic-Geometric Codes
FOCS '98 Proceedings of the 39th Annual Symposium on Foundations of Computer Science
Hardness of Approximating the Minimum Distance of a Linear Code
FOCS '99 Proceedings of the 40th Annual Symposium on Foundations of Computer Science
The design and analysis of graphical passwords
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Efficient cryptographic protocols based on noisy channels
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Noisy polynomial interpolation and noisy chinese remaindering
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Provably secure password-authenticated key exchange using Diffie-Hellman
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Towards practical biometric key generation with randomized biometric templates
Proceedings of the 15th ACM conference on Computer and communications security
An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication
IWSEC '08 Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security
Unidirectional key distribution across time and space with applications to RFID security
SS'08 Proceedings of the 17th conference on Security symposium
Nineteen Urgent Research Topics in Biometrics and Identity Management
Biometrics and Identity Management
Efficient Biometric Verification in Encrypted Domain
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
A New Approach for Biometric Template Storage and Remote Authentication
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Data Is Key: Introducing the Data-Based Access Control Paradigm
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
A channel coding approach for human authentication from gait sequences
IEEE Transactions on Information Forensics and Security
Biometric cryptosystem using function based on-line signature recognition
Expert Systems with Applications: An International Journal
Expert Systems with Applications: An International Journal
Template protection for dynamic time warping based biometric signature authentication
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
Multibiometric cryptosystem: model structure and performance analysis
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Biometric template protection in multimodal authentication systems based on error correcting codes
Journal of Computer Security - EU-Funded ICT Research on Trust and Security
Fingerprint hardening with randomly selected chaff minutiae
CAIP'07 Proceedings of the 12th international conference on Computer analysis of images and patterns
Extended private information retrieval and its application in biometrics authentications
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
Minutiae and modified Biocode fusion for fingerprint-based key generation
Journal of Network and Computer Applications
Improving the accuracy and storage cost in biometric remote authentication schemes
Journal of Network and Computer Applications
A formal study of the privacy concerns in biometric-based remote authentication schemes
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
An authentication protocol with encrypted biometric data
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
Cancelable templates for sequence-based biometrics with application to on-line signature recognition
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans - Special issue on recent advances in biometrics
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans - Special issue on recent advances in biometrics
Blind authentication: a secure crypto-biometric verification protocol
IEEE Transactions on Information Forensics and Security
eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics
Proceedings of the 12th ACM workshop on Multimedia and security
Security analysis of a fingerprint-protected USB drive
Proceedings of the 26th Annual Computer Security Applications Conference
Pair-polar coordinate-based cancelable fingerprint templates
Pattern Recognition
Problems of Information Transmission
A review on body area networks security for healthcare
ISRN Communications and Networking
Electronic Commerce Research and Applications
Fuzzy cyclic random mapping for face recognition based on MD-RiuLBP feature
CCBR'11 Proceedings of the 6th Chinese conference on Biometric recognition
On fuzzy syndrome hashing with LDPC coding
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
A crypto-biometric scheme based on iris-templates with fuzzy extractors
Information Sciences: an International Journal
Fuzzy vault for multiple users
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
Biometric hashing based on genetic selection and its application to on-line signatures
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
A key sharing fuzzy vault scheme
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
PalmHash Code vs. PalmPhasor Code
Neurocomputing
Balancing security and utility in medical devices?
Proceedings of the 50th Annual Design Automation Conference
Hi-index | 0.00 |
We describe a simple and novel cryptographic construction that we refer to as a fuzzy vault. A player Alice may place a secret value 驴 in a fuzzy vault and "lock" it using a set A of elements from some public universe U. If Bob tries to "unlock" the vault using a set B of similar length, he obtains 驴 only if B is close to A, i.e., only if A and B overlap substantially. In constrast to previous constructions of this flavor, ours possesses the useful feature of order invariance, meaning that the ordering of A and B is immaterial to the functioning of the vault. As we show, our scheme enjoys provable security against a computationally unbounded attacker. Fuzzy vaults have potential application to the problem of protecting data in a number of real-world, error-prone environments. These include systems in which personal information serves to authenticate users for, e.g., the purposes of password recovery, and also to biometric authentication systems, in which readings are inherently noisy as a result of the refractory nature of image capture and processing.