A review of privacy-preserving biometric identification and authentication protocols

L Zeng, P Shen, X Zhu, X Tian, C Chen - Computers & Security, 2025 - Elsevier
Biometrics now play a crucial role in user identification and authentication. However, storing
biometric features in plaintext and conducting authentication without protection pose a risk of …

Lightweight, Secure, Similar-Document Retrieval over Encrypted Data

MA Al Sibahee, AI Abdulsada, ZA Abduljabbar, J Ma… - Applied Sciences, 2021 - mdpi.com
Applications for document similarity detection are widespread in diverse communities,
including institutions and corporations. However, currently available detection systems fail to …

Secure pattern matching using somewhat homomorphic encryption

M Yasuda, T Shimoyama, J Kogure… - Proceedings of the …, 2013 - dl.acm.org
The basic pattern matching problem is to find the locations where a pattern occurs in a text.
Recently, secure pattern matching has been received much attention in various areas …

Secure distributed matrix computation with discrete fourier transform

N Mital, C Ling, D Gündüz - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
We consider the problem of secure distributed matrix computation (SDMC), where a user
queries a function of data matrices generated at distributed source nodes. We assume the …

Evaluating Homomorphic Operations on a Real-World Processing-In-Memory System

H Gupta, M Kabra, J Gómez-Luna… - 2023 IEEE …, 2023 - ieeexplore.ieee.org
Computing on encrypted data is a promising approach to reduce data security and privacy
risks, with homomorphic encryption serving as a facilitator in achieving this goal. In this work …

New packing method in somewhat homomorphic encryption and its applications

M Yasuda, T Shimoyama, J Kogure… - Security and …, 2015 - Wiley Online Library
Somewhat homomorphic encryption is public key encryption supporting a limited number of
additions and multiplications on encrypted data. This encryption gives a powerful tool in …

A survey of homomorphic encryption for outsourced big data computation

TS Fun, A Samsudin - KSII Transactions on Internet and Information …, 2016 - koreascience.kr
With traditional data storage solutions becoming too expensive and cumbersome to support
Big Data processing, enterprises are now starting to outsource their data requirements to …

Instant privacy-preserving biometric authentication for hamming distance

J Lee, D Kim, D Kim, Y Song, J Shin… - Cryptology ePrint …, 2018 - eprint.iacr.org
In recent years, there has been enormous research attention in privacy-preserving biometric
authentication, which enables a user to verify him or herself to a server without disclosing …

Secure Hamming distance computation for biometrics using ideal-lattice and ring-LWE homomorphic encryption

M Yasuda - Information Security Journal: A Global Perspective, 2017 - Taylor & Francis
With widespread development of biometrics, concerns about security and privacy are rapidly
increasing. Homomorphic encryption enables us to operate on encrypted data without …

Improved post-quantum-secure face template protection system based on packed homomorphic encryption

H Tamiya, T Isshiki, K Mori, S Obana… - … Conference of the …, 2021 - ieeexplore.ieee.org
This paper proposes an efficient face template protection system based on homomorphic
encryption. By develo** a message packing method suitable for the calculation of the …