Biometric-based two-factor authentication scheme under database leakage
From MaRDI portal
Publication:6495784
DOI10.1016/J.TCS.2024.114552MaRDI QIDQ6495784
Shengli Liu, Shuai Han, Mingming Jiang, Da-Wu Gu
Publication date: 2 May 2024
Published in: Theoretical Computer Science (Search for Journal in Brave)
Cites Work
- Robust property-preserving hash functions for Hamming distance and more
- Deniable fully homomorphic encryption from learning with errors
- Obfuscated fuzzy Hamming distance and conjunctions from subset product problems
- How to record quantum queries, and applications to quantum indifferentiability
- Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
- Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
- Fully Homomorphic Encryption over the Integers with Shorter Public Keys
- Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
- Nearly optimal property preserving hashing
- Unnamed Item
This page was built for publication: Biometric-based two-factor authentication scheme under database leakage