{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T06:26:28Z","timestamp":1769149588501,"version":"3.49.0"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030016883","type":"print"},{"value":"9783030016890","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01689-0_20","type":"book-chapter","created":{"date-parts":[[2018,9,22]],"date-time":"2018-09-22T11:22:22Z","timestamp":1537615342000},"page":"254-269","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Privacy Preserving Biometric Identification on the Bitcoin Blockchain"],"prefix":"10.1007","author":[{"given":"Neyire Deniz","family":"Sarier","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,23]]},"reference":[{"key":"20_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/978-3-319-67816-0_22","volume-title":"Data Privacy Management, Cryptocurrencies and Blockchain Technology","author":"D Augot","year":"2017","unstructured":"Augot, D., Chabanne, H., Chenevier, T., George, W., Lambert, L.: A user-centric system for verified identities on the bitcoin blockchain. In: Garcia-Alfaro, J., Navarro-Arribas, G., Hartenstein, H., Herrera-Joancomart\u00ed, J. (eds.) ESORICS\/DPM\/CBT -2017. LNCS, vol. 10436, pp. 390\u2013407. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-67816-0_22"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Augot, D., Chabanne, H., Cl\u00e9mot, O., George, W.: Transforming face-to-face identity proofing into anonymous digital identity using the bitcoin blockchain. CoRR abs\/1710.02951 (2017)","DOI":"10.1109\/PST.2017.00014"},{"key":"20_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/978-3-540-73458-1_8","volume-title":"Information Security and Privacy","author":"J Bringer","year":"2007","unstructured":"Bringer, J., Chabanne, H., Izabach\u00e8ne, M., Pointcheval, D., Tang, Q., Zimmer, S.: An application of the Goldwasser-Micali cryptosystem to biometric authentication. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 96\u2013106. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-73458-1_8"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Chun, H., Elmehdwi, Y., Li, F., Bhattacharya, P., Jiang, W.: Outsourcable two-party privacy preserving biometric authentication. In: ACM ASIACCS 2014, pp. 401\u2013412 (2014)","DOI":"10.1145\/2590296.2590343"},{"key":"20_CR5","unstructured":"CryptID. https:\/\/github.com\/cryptidid\/cryptid , http:\/\/cryptid.xyz\/ . Consulted May 2018"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Danezis, G., Fournet, C., Kohlweiss, M., Parno, B.: Pinocchio coin: building zerocoin from a succinct pairing-based proof system. In: PETShop 2013, pp. 27\u201330. ACM (2013)","DOI":"10.1145\/2517872.2517878"},{"key":"20_CR7","unstructured":"Gaetani, E., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., Sassone, V.: Blockchain-based database to ensure data integrity in cloud computing environments. In: ITASEC 2017, vol. 1816, pp. 146\u2013155. CEUR-WS.org (2017)"},{"key":"20_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/978-3-319-31301-6_3","volume-title":"Selected Areas in Cryptography \u2013 SAC 2015","author":"H Higo","year":"2016","unstructured":"Higo, H., Isshiki, T., Mori, K., Obana, S.: Privacy-preserving fingerprint authentication resistant to hill-climbing attacks. In: Dunkelman, O., Keliher, L. (eds.) SAC 2015. LNCS, vol. 9566, pp. 44\u201364. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-31301-6_3"},{"issue":"2","key":"20_CR9","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10623-005-6343-z","volume":"38","author":"A Juels","year":"2006","unstructured":"Juels, A., Sudan, M.: A fuzzy vault scheme. Des. Codes Cryptogr. 38(2), 237\u2013257 (2006)","journal-title":"Des. Codes Cryptogr."},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: ACM CCS, pp. 28\u201336 (1999)","DOI":"10.1145\/319709.319714"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Miers, I., Garman, C., Green, M., Rubin, A.D.: Zerocoin: anonymous distributed e-cash from bitcoin. In: SP 2013, pp. 397\u2013411. IEEE (2013)","DOI":"10.1109\/SP.2013.34"},{"key":"20_CR12","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Othman, A., Callahan, J.: The Horcrux protocol: a method for decentralized biometric-based self-sovereign identity. CoRR abs\/1711.07127 (2017)","DOI":"10.1109\/IJCNN.2018.8489316"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Sarier, N.D.: Practical multi-factor biometric remote authentication. In: BTAS 2010, pp. 1\u20136. IEEE (2010)","DOI":"10.1109\/BTAS.2010.5634541"},{"key":"20_CR15","unstructured":"Sarier, N.D.: Biometric cryptosystems: authentication, encryption and signature for biometric identities. Ph.D. thesis, Bonn University, Germany (2013)"},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-319-24018-3_4","volume-title":"Information Security Theory and Practice","author":"ND Sarier","year":"2015","unstructured":"Sarier, N.D.: Private minutia-based fingerprint matching. In: Akram, R.N., Jajodia, S. (eds.) WISTP 2015. LNCS, vol. 9311, pp. 52\u201367. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24018-3_4"},{"key":"20_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-319-57186-7_8","volume-title":"Green, Pervasive, and Cloud Computing","author":"ND Sarier","year":"2017","unstructured":"Sarier, N.D.: Privacy preserving multimodal biometric authentication in the cloud. In: Au, M.H.A., Castiglione, A., Choo, K.-K.R., Palmieri, F., Li, K.-C. (eds.) GPC 2017. LNCS, vol. 10232, pp. 90\u2013104. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-57186-7_8"},{"key":"20_CR18","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.future.2017.09.078","volume":"80","author":"ND Sarier","year":"2018","unstructured":"Sarier, N.D.: Multimodal biometric identity based encryption. Future Gener. Comp. Syst. 80, 112\u2013125 (2018)","journal-title":"Future Gener. Comp. Syst."},{"key":"20_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-642-31448-3_32","volume-title":"Information Security and Privacy","author":"SF Shahandashti","year":"2012","unstructured":"Shahandashti, S.F., Safavi-Naini, R., Ogunbona, P.: Private fingerprint matching. In: Susilo, W., Mu, Y., Seberry, J. (eds.) ACISP 2012. LNCS, vol. 7372, pp. 426\u2013433. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31448-3_32"},{"issue":"2","key":"20_CR20","first-page":"833","volume":"7","author":"K Simoens","year":"2012","unstructured":"Simoens, K., Bringer, J., Chabanne, H., Seys, S.: A framework for analyzing template security and privacy in biometric authentication systems. IEEE TIFS 7(2), 833\u2013841 (2012)","journal-title":"IEEE TIFS"},{"key":"20_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-642-11925-5_9","volume-title":"Topics in Cryptology - CT-RSA 2010","author":"G Yang","year":"2010","unstructured":"Yang, G., Tan, C.H., Huang, Q., Wong, D.S.: Probabilistic public key encryption with equality test. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol. 5985, pp. 119\u2013131. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-11925-5_9"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01689-0_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T17:06:06Z","timestamp":1571936766000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01689-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030016883","9783030016890"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01689-0_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"CSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Cyberspace Safety and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amalfi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"css2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/css2018.di.unisa.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}