A fuzzy vault scheme
From MaRDI portal
Publication:2491270
DOI10.1007/s10623-005-6343-zzbMath1172.94578OpenAlexW3160027900MaRDI QIDQ2491270
Publication date: 29 May 2006
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-005-6343-z
Related Items (24)
Recovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of ACNS 2015 and 2016 ⋮ Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy ⋮ Authentication in Constrained Settings ⋮ Enhance fuzzy vault security using nonrandom chaff point generator ⋮ Beyond the Csiszár-Körner bound: best-possible wiretap coding via obfuscation ⋮ A Practical Fuzzy Extractor for Continuous Features ⋮ Fuzzy authenticated key exchange with tight security ⋮ Beyond the Csiszár-Korner bound: best-possible wiretap coding via obfuscation ⋮ One-time programs from commodity hardware ⋮ Computational fuzzy extractors ⋮ Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication ⋮ Binding cryptographic keys into biometric data: optimization ⋮ Cancellable biometrics and annotations on biohash ⋮ Extracting biometric binary strings with minimal area under the FRR curve for the Hamming distance classifier ⋮ A fuzzy vault scheme ⋮ Hiding Secret Points Amidst Chaff ⋮ Current Challenges for IT Security with Focus on Biometry ⋮ Reusable fuzzy extractor from the decisional Diffie-Hellman assumption ⋮ Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks ⋮ Leakage-resilient biometric-based remote user authentication with fuzzy extractors ⋮ Key masking using biometry ⋮ A novel fuzzy vault scheme based on fingerprint and finger vein feature fusion ⋮ Simple multi-party set reconciliation ⋮ BehavioCog: An Observation Resistant Authentication Scheme
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A fuzzy vault scheme
- Experimental quantum cryptography.
- How to share a secret
- Proving Without Knowing: On Oblivious, Agnostic and Blindfolded Provers
- A new identification scheme based on syndrome decoding
- Improved decoding of Reed-Solomon and algebraic-geometry codes
- Hardness of approximating the minimum distance of a linear code
- Password hardening based on keystroke dynamics
- Shift-register synthesis and BCH decoding
- Encoding and error-correction procedures for the Bose-Chaudhuri codes
This page was built for publication: A fuzzy vault scheme