A review of privacy-preserving biometric identification and authentication protocols
L Zeng, P Shen, X Zhu, X Tian, C Chen - Computers & Security, 2025 - Elsevier
Biometrics now play a crucial role in user identification and authentication. However, storing
biometric features in plaintext and conducting authentication without protection pose a risk of …
biometric features in plaintext and conducting authentication without protection pose a risk of …
Lightweight, Secure, Similar-Document Retrieval over Encrypted Data
Applications for document similarity detection are widespread in diverse communities,
including institutions and corporations. However, currently available detection systems fail to …
including institutions and corporations. However, currently available detection systems fail to …
Secure pattern matching using somewhat homomorphic encryption
The basic pattern matching problem is to find the locations where a pattern occurs in a text.
Recently, secure pattern matching has been received much attention in various areas …
Recently, secure pattern matching has been received much attention in various areas …
Secure distributed matrix computation with discrete fourier transform
We consider the problem of secure distributed matrix computation (SDMC), where a user
queries a function of data matrices generated at distributed source nodes. We assume the …
queries a function of data matrices generated at distributed source nodes. We assume the …
Evaluating Homomorphic Operations on a Real-World Processing-In-Memory System
Computing on encrypted data is a promising approach to reduce data security and privacy
risks, with homomorphic encryption serving as a facilitator in achieving this goal. In this work …
risks, with homomorphic encryption serving as a facilitator in achieving this goal. In this work …
New packing method in somewhat homomorphic encryption and its applications
Somewhat homomorphic encryption is public key encryption supporting a limited number of
additions and multiplications on encrypted data. This encryption gives a powerful tool in …
additions and multiplications on encrypted data. This encryption gives a powerful tool in …
A survey of homomorphic encryption for outsourced big data computation
With traditional data storage solutions becoming too expensive and cumbersome to support
Big Data processing, enterprises are now starting to outsource their data requirements to …
Big Data processing, enterprises are now starting to outsource their data requirements to …
Instant privacy-preserving biometric authentication for hamming distance
In recent years, there has been enormous research attention in privacy-preserving biometric
authentication, which enables a user to verify him or herself to a server without disclosing …
authentication, which enables a user to verify him or herself to a server without disclosing …
Secure Hamming distance computation for biometrics using ideal-lattice and ring-LWE homomorphic encryption
M Yasuda - Information Security Journal: A Global Perspective, 2017 - Taylor & Francis
With widespread development of biometrics, concerns about security and privacy are rapidly
increasing. Homomorphic encryption enables us to operate on encrypted data without …
increasing. Homomorphic encryption enables us to operate on encrypted data without …
Improved post-quantum-secure face template protection system based on packed homomorphic encryption
H Tamiya, T Isshiki, K Mori, S Obana… - … Conference of the …, 2021 - ieeexplore.ieee.org
This paper proposes an efficient face template protection system based on homomorphic
encryption. By develo** a message packing method suitable for the calculation of the …
encryption. By develo** a message packing method suitable for the calculation of the …