Biometric template security: an overview

N Riaz, A Riaz, SA Khan - Sensor Review, 2018 - emerald.com
Purpose The security of the stored biometric template is itself a challenge. Feature
transformation techniques and biometric cryptosystems are used to address the concerns …

Efficient, reusable fuzzy extractors from LWE

D Apon, C Cho, K Eldefrawy, J Katz - International Conference on Cyber …, 2017 - Springer
A fuzzy extractor (FE) enables reproducible generation of high-quality randomness from
noisy inputs having sufficient min-entropy. FEs have been proposed for deriving …

Preimage attack on biohashing

P Lacharme, E Cherrier… - … Conference on Security …, 2013 - ieeexplore.ieee.org
Biometric recognition is more and more employed in authentication and access control of
various applications. Biometric data are strongly linked with the user and do not allow …

Analysis of reusability of secure sketches and fuzzy extractors

M Blanton, M Aliasgari - IEEE transactions on information …, 2013 - ieeexplore.ieee.org
Secure sketches and fuzzy extractors enable the use of biometric data in cryptographic
applications by correcting errors in noisy biometric readings and producing cryptographic …

Fpga implementation of a cryptographically-secure puf based on learning parity with noise

C **, C Herder, L Ren, PH Nguyen, B Fuller… - Cryptography, 2017 - mdpi.com
Herder et al.(IEEE Transactions on Dependable and Secure Computing, 2017) designed a
new computational fuzzy extractor and physical unclonable function (PUF) challenge …

Reusable fuzzy extractor from LWE

Y Wen, S Liu - Australasian Conference on Information Security and …, 2018 - Springer
Fuzzy extractor converts the reading of a noisy non-uniform source to a reproducible and
almost uniform output R. The output R in turn is used in some cryptographic system as a …

A lightweight privacy-aware continuous authentication protocol-paca

A Acar, S Ali, K Karabina, C Kaygusuz, H Aksu… - ACM Transactions on …, 2021 - dl.acm.org
As many vulnerabilities of one-time authentication systems have already been uncovered,
there is a growing need and trend to adopt continuous authentication systems. Biometrics …

Cryptographic key derivation from biometric inferences for remote authentication

E Uzun, C Yagemann, S Chung, V Kolesnikov… - Proceedings of the 2021 …, 2021 - dl.acm.org
Biometric authentication is getting increasingly popular because of its appealing usability
and improvements in biometric sensors. At the same time, it raises serious privacy concerns …

Oblivious extractors and improved security in biometric-based authentication systems

I De Oliveira Nunes, P Rindal, M Shirvanian - European Symposium on …, 2023 - Springer
We study the problem of biometric-based authentication with template privacy. Typical
schemes addressing this problem, such as Fuzzy Vaults (FV) and Fuzzy Extractors (FE) …

Using biometric key commitments to prevent unauthorized lending of cryptographic credentials

D Bissessar, C Adams, D Liu - 2014 Twelfth Annual …, 2014 - ieeexplore.ieee.org
We present a technique that uses privacy enhancing technologies and biometrics to prevent
the unauthorized lending of credentials. Current credential schemes suffer the weakness …