Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption
暂无分享,去创建一个
Fuchun Guo | Yi Mu | Willy Susilo | Y. Mu | W. Susilo | F. Guo
[1] Bruce A. Draper,et al. Recognizing faces with PCA and ICA , 2003, Comput. Vis. Image Underst..
[2] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[3] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[4] Javier Herranz,et al. Constant Size Ciphertexts in Threshold Attribute-Based Encryption , 2010, Public Key Cryptography.
[5] Elaine Shi,et al. Predicate Privacy in Encryption Systems , 2009, IACR Cryptol. ePrint Arch..
[6] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[7] Vinod Vaikuntanathan,et al. Functional Encryption for Inner Product Predicates from Learning with Errors , 2011, IACR Cryptol. ePrint Arch..
[8] Vytautas Perlibakas,et al. Distance measures for PCA-based face recognition , 2004, Pattern Recognit. Lett..
[9] Brent Waters,et al. Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions , 2009, IACR Cryptol. ePrint Arch..
[10] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[11] Craig Gentry,et al. Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.
[12] 金出 武雄,et al. Picture processing system by computer complex and recognition of human faces , 1974 .
[13] Roberto Brunelli,et al. Face Recognition: Features Versus Templates , 1993, IEEE Trans. Pattern Anal. Mach. Intell..
[14] Jong Hwan Park,et al. Inner-product encryption under standard assumptions , 2011, Des. Codes Cryptogr..
[15] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[16] Jonathan Katz,et al. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.
[17] Fuchun Guo,et al. Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption , 2014, IEEE Transactions on Information Forensics and Security.
[18] H Moon,et al. Computational and Performance Aspects of PCA-Based Face-Recognition Algorithms , 2001, Perception.
[19] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[20] Tatsuaki Okamoto,et al. Hierarchical Predicate Encryption for Inner-Products , 2009, ASIACRYPT.
[21] Rabia Jafri,et al. A Survey of Face Recognition Techniques , 2009, J. Inf. Process. Syst..
[22] Brent Waters,et al. Functional Encryption for Regular Languages , 2012, CRYPTO.
[23] Zhibin Zhou,et al. On efficient ciphertext-policy attribute based encryption and broadcast encryption: extended abstract , 2010, CCS '10.
[24] Fuchun Guo,et al. Identity-Based Online/Offline Encryption , 2008, Financial Cryptography.
[25] Brent Waters,et al. Online/Offline Attribute-Based Encryption , 2014, IACR Cryptol. ePrint Arch..
[26] Matti Pietikäinen,et al. Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[27] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[28] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[29] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[30] Nuttapong Attrapadung,et al. Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation , 2010, Public Key Cryptography.
[31] Vinod Vaikuntanathan,et al. Attribute-based encryption for circuits , 2013, STOC '13.
[32] Allison Bishop,et al. New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts , 2010, IACR Cryptol. ePrint Arch..
[33] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[34] Anil K. Jain,et al. Multibiometric Cryptosystems Based on Feature-Level Fusion , 2012, IEEE Transactions on Information Forensics and Security.
[35] Frans M. J. Willems,et al. Biometric Systems: Privacy and Secrecy Aspects , 2009, IEEE Transactions on Information Forensics and Security.
[36] Brent Waters,et al. Attribute-Based Encryption for Circuits from Multilinear Maps , 2012, CRYPTO.
[37] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[38] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.