An Efficient Privacy-Preserving Palmprint Authentication Scheme Based on Homomorphic Encryption
暂无分享,去创建一个
Huiyong Wang | Shijie Tang | Jilin Wang | Yong Ding | Yong Ding | Shijie Tang | Huiyong Wang | Jilin Wang
[1] Dario Fiore,et al. Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data , 2015, CCS.
[2] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[3] Marina Blanton,et al. Secure and Efficient Protocols for Iris and Fingerprint Identification , 2011, ESORICS.
[4] K. Srinathan,et al. Blind Authentication: A Secure Crypto-Biometric Verification Protocol , 2010, IEEE Transactions on Information Forensics and Security.
[5] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[6] Dimitris Achlioptas,et al. Database-friendly random projections: Johnson-Lindenstrauss with binary coins , 2003, J. Comput. Syst. Sci..
[7] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[8] Xiaojiang Du,et al. Self-healing sensor networks with distributed decision making , 2007, Int. J. Sens. Networks.
[9] Mun-Kyu Lee,et al. Privacy-Preserving Palm Print Authentication Using Homomorphic Encryption , 2016, 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).
[10] Andrew Beng Jin Teoh,et al. An automated palmprint recognition system , 2005, Image Vis. Comput..
[11] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[12] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.
[13] Xiaojiang Du,et al. A Lightweight Multicast Authentication Mechanism for Small Scale IoT Applications , 2013, IEEE Sensors Journal.
[14] Heikki Mannila,et al. Random projection in dimensionality reduction: applications to image and text data , 2001, KDD '01.
[15] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[16] Berry Schoenmakers,et al. Computationally Secure Authentication with Noisy Data , 2007 .
[17] Honggang Zhang,et al. Comments on "Globally Maximizing, Locally Minimizing: Unsupervised Discriminant Projection with Application to Face and Palm Biometrics" , 2007, IEEE Trans. Pattern Anal. Mach. Intell..
[18] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[19] Wang-Meng Zuo,et al. Survey of Palmprint Recognition Algorithms: Survey of Palmprint Recognition Algorithms , 2010 .
[20] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.