Security, privacy and performance improvements for fuzzy extractors

R Brien - 2020 - ruor.uottawa.ca
With the usage of biometrics becoming commonly used in a variety of applications, keeping
those biometrics private and secure is an important issue. Indeed, the convenience of using …

Design and analysis of fuzzy extractors for faces

Y Sutcu, Q Li, N Memon - … in Global Homeland Security V and …, 2009 - spiedigitallibrary.org
It is both crucial and challenging to protect biometric data used for biometric identification
and authentication systems, while keeping the systems user friendly. We study the design …

Fuzzy extractors

Y Dodis, L Reyzin, A Smith - Security with Noisy Data: On Private …, 2007 - Springer
This chapter presents a general approach for handling secret biometric data in
cryptographic applications. The generality manifests itself in two ways: We attempt to …

Robust and reusable fuzzy extractors

X Boyen - Security with Noisy Data: On Private Biometrics, Secure …, 2007 - Springer
The use of biometric features as key material in security protocols has often been suggested
to relieve their owner from the need to remember long cryptographic secrets. The appeal of …

Fuzzy extractors for continuous distributions

I Buhan, J Doumen, P Hartel, R Veldhuis - Proceedings of the 2nd ACM …, 2007 - dl.acm.org
We show that there is a direct relation between the maximum length of the keys extracted
from biometric data and the error rates of the biometric system. The length of the bio-key …

Testing fuzzy extractors for face biometrics: generating deep datasets

AA Tambay - 2020 - ruor.uottawa.ca
Biometrics can provide alternative methods for security than conventional authentication
methods. There has been much research done in the field of biometrics, and efforts have …

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

Y Dodis, L Reyzin, A Smith - … : International Conference On The Theory And …, 2004 - Springer
We provide formal definitions and efficient secure techniques for turning biometric
information into keys usable for any cryptographic application, and reliably and securely …

A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.'s Construction

JH Cheon, J Jeong, D Kim, J Lee - … , NSW, Australia, July 11-13, 2018 …, 2018 - Springer
After the concept of a Fuzzy Extractor (FE) was first introduced by Dodis et al., it has been
regarded as one of the candidate solutions for key management utilizing biometric data …

Deep learning based fuzzy extractor for generating strong keys from biometric face images

A Kuznetsov, D Zakharov, E Frontoni… - 2022 IEEE 9th …, 2022 - ieeexplore.ieee.org
Biometric techniques have traditionally been used in various cybersecurity applications. For
instance, some user authentication systems use biometric facial images, fingerprints, iris …

[PDF][PDF] Analysis of Fuzzy Encryption Schemes for the Protection of Biometric Data

K Simoens - 2012 - esat.kuleuven.be
This thesis focuses on the analysis of techniques for the protection of biometric data. The
increasing use of biometrics for the identification and authentication of individuals has raised …