Biometric template security: an overview
Purpose The security of the stored biometric template is itself a challenge. Feature
transformation techniques and biometric cryptosystems are used to address the concerns …
transformation techniques and biometric cryptosystems are used to address the concerns …
Efficient, reusable fuzzy extractors from LWE
A fuzzy extractor (FE) enables reproducible generation of high-quality randomness from
noisy inputs having sufficient min-entropy. FEs have been proposed for deriving …
noisy inputs having sufficient min-entropy. FEs have been proposed for deriving …
Preimage attack on biohashing
P Lacharme, E Cherrier… - … Conference on Security …, 2013 - ieeexplore.ieee.org
Biometric recognition is more and more employed in authentication and access control of
various applications. Biometric data are strongly linked with the user and do not allow …
various applications. Biometric data are strongly linked with the user and do not allow …
Analysis of reusability of secure sketches and fuzzy extractors
Secure sketches and fuzzy extractors enable the use of biometric data in cryptographic
applications by correcting errors in noisy biometric readings and producing cryptographic …
applications by correcting errors in noisy biometric readings and producing cryptographic …
Fpga implementation of a cryptographically-secure puf based on learning parity with noise
Herder et al.(IEEE Transactions on Dependable and Secure Computing, 2017) designed a
new computational fuzzy extractor and physical unclonable function (PUF) challenge …
new computational fuzzy extractor and physical unclonable function (PUF) challenge …
Reusable fuzzy extractor from LWE
Y Wen, S Liu - Australasian Conference on Information Security and …, 2018 - Springer
Fuzzy extractor converts the reading of a noisy non-uniform source to a reproducible and
almost uniform output R. The output R in turn is used in some cryptographic system as a …
almost uniform output R. The output R in turn is used in some cryptographic system as a …
A lightweight privacy-aware continuous authentication protocol-paca
As many vulnerabilities of one-time authentication systems have already been uncovered,
there is a growing need and trend to adopt continuous authentication systems. Biometrics …
there is a growing need and trend to adopt continuous authentication systems. Biometrics …
Cryptographic key derivation from biometric inferences for remote authentication
Biometric authentication is getting increasingly popular because of its appealing usability
and improvements in biometric sensors. At the same time, it raises serious privacy concerns …
and improvements in biometric sensors. At the same time, it raises serious privacy concerns …
Oblivious extractors and improved security in biometric-based authentication systems
We study the problem of biometric-based authentication with template privacy. Typical
schemes addressing this problem, such as Fuzzy Vaults (FV) and Fuzzy Extractors (FE) …
schemes addressing this problem, such as Fuzzy Vaults (FV) and Fuzzy Extractors (FE) …
Using biometric key commitments to prevent unauthorized lending of cryptographic credentials
D Bissessar, C Adams, D Liu - 2014 Twelfth Annual …, 2014 - ieeexplore.ieee.org
We present a technique that uses privacy enhancing technologies and biometrics to prevent
the unauthorized lending of credentials. Current credential schemes suffer the weakness …
the unauthorized lending of credentials. Current credential schemes suffer the weakness …