搜索结果: 1-6 共查到“军队指挥学 biometric authentication”相关记录6条 . 查询时间(0.093 秒)
Instant Privacy-Preserving Biometric Authentication for Hamming Distance
privacy-preserving biometric authentication inner product encryption learning with errors
2018/12/24
In recent years, there has been enormous research attention in privacy-preserving biometric authentication, which enables a user to verify him or herself to a server without disclosing raw biometric i...
Privacy-preserving biometric authentication: challenges and directions
biometric authentication applications
2017/5/25
An emerging direction for authenticating people is the adoption of biometric authentication systems. Biometric credentials are becoming increasingly popular as a mean of authenticating people due to t...
Ghostshell: Secure Biometric Authentication using Integrity-based Homomorphic Evaluations
Biometric authentication Homomorphic encryption MAC
2016/5/24
Biometric authentication methods are gaining popularity due to their convenience. For an authentication without relying on trusted hardwares, biometrics or their hashed values should be stored in the ...
Fast and Secure Linear Regression and Biometric Authentication with Security Update
Homomorphic encryption LWE assumption
2015/12/29
We explicitly present a homomorphic encryption scheme with a flexible encoding of plaintexts.
We prove its security under the LWE assumption, and innovatively show how the scheme can be
used to hand...
Secure Biometric Authentication With Improved Accuracy
Secure Biometric Authentication Cryptography Classifier
2009/6/5
We propose a new hybrid protocol for cryptographically se-
cure biometric authentication. The main advantages of the proposed pro-
tocol over previous solutions can be summarised as follows: (1) pot...
Capacity and Examples of Template-Protecting Biometric Authentication Systems
Template-Protecting Biometric Authentication Systems secrecy capacity Cs
2009/3/26
In this paper, we formulate the requirements for privacy pro-
tecting biometric authentication systems. The secrecy capacity Cs is in-
vestigated for the discrete and the continuous case. We present...