{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T14:17:32Z","timestamp":1772893052770,"version":"3.50.1"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319491745","type":"print"},{"value":"9783319491752","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49175-2_12","type":"book-chapter","created":{"date-parts":[[2016,11,9]],"date-time":"2016-11-09T11:59:42Z","timestamp":1478692782000},"page":"241-258","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Practical Fuzzy Extractor for Continuous Features"],"prefix":"10.1007","author":[{"given":"Vladimir P.","family":"Parente","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jeroen","family":"van de Graaf","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,11,10]]},"reference":[{"key":"12_CR1","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, pp. 175\u2013179 (1984)"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/3-540-46766-1_29","volume-title":"Advances in Cryptology \u2014 CRYPTO 1991","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H., Brassard, G., Cr\u00e9peau, C., Skubiszewska, M.-H.: Practical quantum oblivious transfer. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 351\u2013366. Springer, Heidelberg (1992). doi: 10.1007\/3-540-46766-1_29"},{"key":"12_CR3","unstructured":"Buhan, I.R., Doumen, J.M., Hartel, P.H., Veldhuis, R.N.J.: Constructing practical fuzzy extractors using QIM. Technical report TR-CTIT-07-52, Centre for Telematics and Information Technology University of Twente (2007)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Buhan, I.R., Doumen, J.M., Hartel, P.H., Veldhuis, R.N.J., Fuzzy Extractors for Continuous Distributions. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, pp. 353\u2013355. ACM (2007)","DOI":"10.1145\/1229285.1229325"},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1007\/3-540-48285-7_35","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1993","author":"G Brassard","year":"1994","unstructured":"Brassard, G., Salvail, L.: Secret-key reconciliation by public discussion. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 410\u2013423. Springer, Heidelberg (1994). doi: 10.1007\/3-540-48285-7_35"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Cr\u00e9peau, C., Kilian, J.: Achieving oblivious transfer using weakened security assumptions (extended abstract). In: FOCS 1988\u201329th Annual Symposium on Foundations of Computer Science, pp. 42\u201352 (1988)","DOI":"10.1109\/SFCS.1988.21920"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/3-540-69053-0_21","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1997","author":"C Cr\u00e9peau","year":"1997","unstructured":"Cr\u00e9peau, C.: Efficient cryptographic protocols based on noisy channels. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 306\u2013317. Springer, Heidelberg (1997). doi: 10.1007\/3-540-69053-0_21"},{"key":"12_CR8","volume-title":"Sphere Packings, Lattices Groups","author":"JH Conway","year":"1998","unstructured":"Conway, J.H., Sloane, N.J.A.: Sphere Packings, Lattices Groups. Springer, Heidelberg (1998). ISBN: 0387985859"},{"key":"12_CR9","unstructured":"Chang, Y.J., Zhang, W., Chen, T.: Biometrics-based cryptographic key generation. In: IEEE International Conference on Multimedia and Expo, vol. 3, pp. 2203\u20132206 (2004)"},{"issue":"1","key":"12_CR10","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y Dodis","year":"2008","unstructured":"Dodis, Y., Reyzin, M., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97\u2013139 (2008)","journal-title":"SIAM J. Comput."},{"issue":"1","key":"12_CR11","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TIT.1962.1057683","volume":"8","author":"RG Gallager","year":"1962","unstructured":"Gallager, R.G.: Low-density parity-check codes. IRE Trans. Inf. Theory 8(1), 21\u201328 (1962)","journal-title":"IRE Trans. Inf. Theory"},{"key":"12_CR12","unstructured":"Juels, A., Sudan, M.: A fuzzy vault scheme. In: Proceedings of IEEE International Symposium on Information Theory, p. 408. IEEE (2002)"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: Proceedings of the 6th ACM Conference on Computer and Communications Security, pp. 28\u201336. ACM (1999)","DOI":"10.1145\/319709.319714"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Kurkoski, B.M., Dauwels, J., Loeliger, H.-A.: Power-constrained communications using LDLC lattices. In: IEEE International Symposium on Information Theory ISIT, pp. 739\u2013743. IEEE (2009)","DOI":"10.1109\/ISIT.2009.5205635"},{"issue":"02","key":"12_CR15","doi-asserted-by":"publisher","first-page":"1550010","DOI":"10.1142\/S0219749915500100","volume":"13","author":"D Lin","year":"2015","unstructured":"Lin, D., Huang, D., Huang, P., Peng, J., Zeng, G.: High performance reconciliation for continuous-variable quantum key distribution with LDPC code. Int. J. Quantum Inf. 13(02), 1550010 (2015)","journal-title":"Int. J. Quantum Inf."},{"key":"12_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/3-540-44887-X_47","volume-title":"Audio- and Video-Based Biometric Person Authentication","author":"J-P Linnartz","year":"2003","unstructured":"Linnartz, J.-P., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 393\u2013402. Springer, Heidelberg (2003). doi: 10.1007\/3-540-44887-X_47"},{"key":"12_CR17","first-page":"422","volume":"2012","author":"N Pietro di","year":"2012","unstructured":"di Pietro, N., Boutros, J.J., Z\u00e9mor, G., Brunel, L.: Integer low-density lattices based on construction A. IEEE Inf. Theory Workshop (ITW) 2012, 422\u2013426 (2012)","journal-title":"IEEE Inf. Theory Workshop (ITW)"},{"issue":"2","key":"12_CR18","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1109\/18.312163","volume":"40","author":"G Poltyrev","year":"1994","unstructured":"Poltyrev, G.: On coding without restrictions for the AWGN channel. IEEE Trans. Inf. Theory 40(2), 409\u2013417 (1994)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"12_CR19","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1109\/TIT.2008.917684","volume":"54","author":"N Sommer","year":"2008","unstructured":"Sommer, N., Feder, M., Shalvi, O.: Low-density lattice codes. IEEE Trans. Inf. Theory 54(4), 1561\u20131585 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"12_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/11527923_45","volume-title":"Audio- and Video-Based Biometric Person Authentication","author":"P Tuyls","year":"2005","unstructured":"Tuyls, P., Akkermans, A.H.M., Kevenaar, T.A.M., Schrijen, G.-J., Bazen, A.M., Veldhuis, R.N.J.: Practical biometric authentication with template protection. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 436\u2013446. Springer, Heidelberg (2005). doi: 10.1007\/11527923_45"},{"issue":"2","key":"12_CR21","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1109\/TIFS.2010.2046965","volume":"5","author":"EA Verbitskiy","year":"2010","unstructured":"Verbitskiy, E.A., Tuyls, P., Obi, C., Schoenmakers, B., \u0160koric, B.: Key extraction from general non-discrete signals. IEEE Trans. Inf. Forensics Secur. 5(2), 269\u2013279 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"12_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-21736-9","volume-title":"All of Statistics: A Concise Course in Statistical Inference","author":"L Wasserman","year":"2004","unstructured":"Wasserman, L.: All of Statistics: A Concise Course in Statistical Inference. Springer, Heidelberg (2004). ISBN: 0387402721"},{"issue":"1","key":"12_CR23","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/S0167-6393(98)00048-X","volume":"26","author":"H Yehia","year":"1998","unstructured":"Yehia, H., Rubin, P., Bateson, E.V.: Quantitative association of vocal-tract and facial behavior. Speech Commun. 26(1), 23\u201343 (1998)","journal-title":"Speech Commun."},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Zheng, G., Li, W., Zhan, C.: Cryptographic key generation from biometric data using lattice mapping. In: IEEE 18th International Conference on Pattern Recognition, vol. 4, pp. 513\u2013516 (2006)","DOI":"10.1109\/ICPR.2006.423"},{"key":"12_CR25","unstructured":"\u0160koric, B., Tuyls, P.: An efficient fuzzy extractor for limited noise. In: Symposium on Information Theory in the Benelux, pp. 193\u2013200 (2009)"}],"container-title":["Lecture Notes in Computer Science","Information Theoretic Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49175-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T06:55:59Z","timestamp":1749711359000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49175-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319491745","9783319491752"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49175-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"10 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICITS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Theoretic Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tacoma","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 August 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 August 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icits2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}