Biometric template protection: A systematic literature review of approaches and modalities

M Sandhya, MVNK Prasad - … and Privacy: Opportunities & Challenges in …, 2017 - Springer
With the emergence of biometric authentication systems, template protection for biometrics
captured attention in the recent years. The privacy concern arises due to storage and misuse …

Data integrity auditing without private key storage for secure cloud storage

W Shen, J Qin, J Yu, R Hao, J Hu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Using cloud storage services, users can store their data in the cloud to avoid the expenditure
of local data storage and maintenance. To ensure the integrity of the data stored in the …

Digital signature authentication for a bank using asymmetric key cryptography algorithm and token based encryption

R Karim, LS Rumi, M Ashiqul Islam, AA Kobita… - … Computing and Mobile …, 2021 - Springer
Nowadays security system is being with more important issues. In modern science,
technology is updated day by day and we are getting insecure in our daily life. Through this …

A secure and practical signature scheme for blockchain based on biometrics

Y Kaga, M Fujio, K Naganuma, K Takahashi… - … Security Practice and …, 2017 - Springer
In a blockchain system, a blockchain transaction is protected against forgery by adding a
digital signature. By digital signature verification, we can confirm that a creator of a …

Fuzzy signatures: relaxing requirements and a new construction

T Matsuda, K Takahashi, T Murakami… - Applied Cryptography and …, 2016 - Springer
Abstract Takahashi et al.(ACNS 2015) introduced the notion of fuzzy signature, which is a
signature scheme that allows a signature to be generated using “fuzzy data”(ie a noisy string …

Revisiting fuzzy signatures: Towards a more risk-free cryptographic authentication system based on biometrics

S Katsumata, T Matsuda, W Nakamura… - Proceedings of the …, 2021 - dl.acm.org
Biometric authentication is one of the promising alternatives to standard password-based
authentication offering better usability and security. In this work, we revisit the biometric …

A quasilinear-time CVP algorithm for triangular lattice based fuzzy extractors and fuzzy signatures

K Takahashi, W Nakamura - 2024 Asia Pacific Signal and …, 2024 - ieeexplore.ieee.org
Fuzzy Extractor (FE) and Fuzzy Signature (FS) are useful schemes for generating
cryptographic keys from fuzzy data such as biometric features. To implement FE and FS for …

Convolutional neural network biometric cryptosystem for the protection of the blockchain's private key

A Albakri, C Mokbel - Procedia Computer Science, 2019 - Elsevier
Blockchain technology has attracted a lot of attention in the previous years as a secure way
to protect transactions in different processes. It has been particularly used to define …

Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks

H Cui, X Yang, W Yang, B Qin… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
A biometric authenticated key derivation (BAKD) scheme is an architecture allowing users to
derive keys from their biometric characteristics with the help of the server via a wireless …

New secret key management technology for blockchains from biometrics fuzzy signature

K Naganuma, T Suzuki, M Yoshino… - 2020 15th Asia Joint …, 2020 - ieeexplore.ieee.org
Blockchain technology is attracting attention as an innovative system for decentralized
payments in fields such as financial area. On the other hand, in a decentralized …