A fuzzy vault scheme

From MaRDI portal
Publication:2491270

DOI10.1007/s10623-005-6343-zzbMath1172.94578OpenAlexW3160027900MaRDI QIDQ2491270

Madhu Sudan, Ari Juels

Publication date: 29 May 2006

Published in: Designs, Codes and Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s10623-005-6343-z




Related Items (24)

Recovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of ACNS 2015 and 2016Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacyAuthentication in Constrained SettingsEnhance fuzzy vault security using nonrandom chaff point generatorBeyond the Csiszár-Körner bound: best-possible wiretap coding via obfuscationA Practical Fuzzy Extractor for Continuous FeaturesFuzzy authenticated key exchange with tight securityBeyond the Csiszár-Korner bound: best-possible wiretap coding via obfuscationOne-time programs from commodity hardwareComputational fuzzy extractorsPrivacy-Preserving Similarity Evaluation and Application to Remote Biometrics AuthenticationBinding cryptographic keys into biometric data: optimizationCancellable biometrics and annotations on biohashExtracting biometric binary strings with minimal area under the FRR curve for the Hamming distance classifierA fuzzy vault schemeHiding Secret Points Amidst ChaffCurrent Challenges for IT Security with Focus on BiometryReusable fuzzy extractor from the decisional Diffie-Hellman assumptionPrivacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing AttacksLeakage-resilient biometric-based remote user authentication with fuzzy extractorsKey masking using biometryA novel fuzzy vault scheme based on fingerprint and finger vein feature fusionSimple multi-party set reconciliationBehavioCog: An Observation Resistant Authentication Scheme


Uses Software


Cites Work


This page was built for publication: A fuzzy vault scheme