2008
DOI: 10.1007/978-3-540-88269-5_2
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(19 citation statements)
references
References 9 publications
0
19
0
Order By: Relevance
“…e) Zero-Knowledge Proofs of Knowledge: On a high level, a zero-knowledge proof of knowledge is a two-party protocol between a prover and a verifier, which allows the prover to convince the verifier that it knows some secret values that satisfy a given relation (proof of knowledge property), without the verifier being able to learn anything about them (zero-knowledge property) [37]. Such proofs are extensively used in applied cryptography as they allow protocol designers to enforce a protocol participant to assure other parties that its actions are consistent with its internal knowledge state, e.g., [38], [39], [40], [41], [42].…”
Section: Input Language and Featuresmentioning
confidence: 98%
“…e) Zero-Knowledge Proofs of Knowledge: On a high level, a zero-knowledge proof of knowledge is a two-party protocol between a prover and a verifier, which allows the prover to convince the verifier that it knows some secret values that satisfy a given relation (proof of knowledge property), without the verifier being able to learn anything about them (zero-knowledge property) [37]. Such proofs are extensively used in applied cryptography as they allow protocol designers to enforce a protocol participant to assure other parties that its actions are consistent with its internal knowledge state, e.g., [38], [39], [40], [41], [42].…”
Section: Input Language and Featuresmentioning
confidence: 98%
“…We highlight detailed differences between our proposed learning model and the existing works. Encryption methods can be employed to address the security and privacy concerns in machine learning 16,17 .…”
Section: Related Workmentioning
confidence: 99%
“…The downside of this development is that the problems of information security and individual's privacy are becoming extremely serious. Biometric authentication can be used to ensure information security (Kikuchi et al 2010;Choi et al 2012;Tistarelli and Schouten 2011). However, it has a lot of problems, such as the finite number of biometric traits and the information leakage caused by stolen biometric templates.…”
Section: Introductionmentioning
confidence: 99%