{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:41:21Z","timestamp":1742982081817,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319694702"},{"type":"electronic","value":"9783319694719"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-69471-9_39","type":"book-chapter","created":{"date-parts":[[2017,10,20]],"date-time":"2017-10-20T10:03:44Z","timestamp":1508493824000},"page":"503-512","source":"Crossref","is-referenced-by-count":1,"title":["An Efficient Privacy-Preserving Palmprint Authentication Scheme Based on Homomorphic Encryption"],"prefix":"10.1007","author":[{"given":"Huiyong","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yong","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Shijie","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Jilin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,21]]},"reference":[{"issue":"3","key":"39_CR1","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1147\/sj.403.0614","volume":"40","author":"NK Ratha","year":"2001","unstructured":"Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614\u2013634 (2001)","journal-title":"IBM Syst. J."},{"doi-asserted-by":"crossref","unstructured":"Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Signal Process. 113  (2008)","key":"39_CR2","DOI":"10.1155\/2008\/579416"},{"key":"39_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-540-30576-7_18","volume-title":"Theory of Cryptography","author":"D Boneh","year":"2005","unstructured":"Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325\u2013341. Springer, Heidelberg (2005). doi:\n10.1007\/978-3-540-30576-7_18"},{"unstructured":"Luo, Z.: Research on blind identity authentication protocol based on biometrics. Ph.D. thesis, Beijing Jiaotong University, Beijing (2014)","key":"39_CR4"},{"issue":"2","key":"39_CR5","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"issue":"2","key":"39_CR6","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1109\/TIFS.2010.2043188","volume":"5","author":"M Upmanyu","year":"2010","unstructured":"Upmanyu, M., Namboodiri, A.M., Srinathan, K., Jawahar, C.V.: Blind authentication: a secure crypto-biometric verification protocol. IEEE Trans. Inf. Forensics Secur. 5(2), 255\u2013268 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"39_CR7","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-1-84628-984-2_9","volume-title":"Security with Noisy Data","author":"B Schoenmakers","year":"2007","unstructured":"Schoenmakers, B., Tuyls, P.: Computationally secure authentication with noisy data. In: Tuyls, P., Skoric, B., Kevenaar, T. (eds.) Security with Noisy Data, pp. 141\u2013149. Springer, London (2007). doi:\n10.1007\/978-1-84628-984-2_9"},{"key":"39_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-642-03168-7_14","volume-title":"Privacy Enhancing Technologies","author":"Z Erkin","year":"2009","unstructured":"Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, I., Toft, T.: Privacy-preserving face recognition. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 235\u2013253. Springer, Heidelberg (2009). doi:\n10.1007\/978-3-642-03168-7_14"},{"key":"39_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/978-3-642-23822-2_11","volume-title":"Computer Security \u2013 ESORICS 2011","author":"M Blanton","year":"2011","unstructured":"Blanton, M., Gasti, P.: Secure and efficient protocols for iris and fingerprint identification. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 190\u2013209. Springer, Heidelberg (2011). doi:\n10.1007\/978-3-642-23822-2_11"},{"unstructured":"Qu, Y.: Research on palmprint authentication based on homomorphic encryption. Ph.D. thesis, Southwest Jiaotong University (2015)","key":"39_CR10"},{"key":"39_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/3-540-39568-7_2","volume-title":"Advances in Cryptology","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10\u201318. Springer, Heidelberg (1985). doi:\n10.1007\/3-540-39568-7_2"},{"doi-asserted-by":"crossref","unstructured":"Im, J.H., Choi, J.C., Nyang, D.H., Lee, M.K.: Privacy-preserving palm print authentication using homomorphic encryption. In: IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress, Auckland, pp. 878\u2013881 (2016)","key":"39_CR12","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.150"},{"key":"39_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999). doi:\n10.1007\/3-540-48910-X_16"},{"doi-asserted-by":"crossref","unstructured":"Catalano, D., Fiore, D.: Using linearly-homomorphic encryption to evaluate degree-2 functions on encrypted data. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, pp. 1518\u20131529. ACM (2015)","key":"39_CR14","DOI":"10.1145\/2810103.2813624"},{"issue":"2","key":"39_CR15","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2), 270\u2013299 (1984)","journal-title":"J. Comput. Syst. Sci."},{"issue":"5\u20136","key":"39_CR16","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1504\/IJSNET.2007.014354","volume":"2","author":"X Du","year":"2007","unstructured":"Du, X., Zhang, M., Nygard, K.E., Guizani, S., Chen, H.-H.: Self-healing sensor networks with distributed decision making. Int. J. Sens. Netw. 2(5\u20136), 289\u2013298 (2007)","journal-title":"Int. J. Sens. Netw."},{"issue":"3","key":"39_CR17","first-page":"353","volume":"36","author":"F Yue","year":"2010","unstructured":"Yue, F., Zuo, W., Zhang, D.: A survey of palmprint recognition. J. Autom. 36(3), 353\u2013365 (2010)","journal-title":"J. Autom."},{"issue":"4","key":"39_CR18","doi-asserted-by":"crossref","first-page":"650","DOI":"10.1109\/TPAMI.2007.1008","volume":"29","author":"J Yang","year":"2007","unstructured":"Yang, J., Zhang, D., Yang, J.-Y., Niu, B.: Globally maximizing, locally minimizing: unsupervised discriminant projection with applications to face and palm biometrics. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 650\u2013664 (2007)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"5","key":"39_CR19","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1016\/j.imavis.2005.01.002","volume":"23","author":"T Connie","year":"2005","unstructured":"Connie, T., Jin, A.T.B., Ong, M.G.K., Ling, D.N.C.: An automated palmprint recognition system. Image Vis. Comput. 23(5), 501\u2013515 (2005)","journal-title":"Image Vis. Comput."},{"doi-asserted-by":"crossref","unstructured":"Bingham, E., Mannil, H.:. Random projection in dimensionality reduction: applications to image and text data. In: Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, pp. 245\u2013250. ACM (2001)","key":"39_CR20","DOI":"10.1145\/502512.502546"},{"issue":"4","key":"39_CR21","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1016\/S0022-0000(03)00025-4","volume":"66","author":"D Achlioptas","year":"2003","unstructured":"Achlioptas, D.: Database-friendly random projections: Johnson-lindenstrauss with binary coins. J. Comput. Syst. Sci. 66(4), 671\u2013687 (2003)","journal-title":"J. Comput. Syst. Sci."},{"issue":"10","key":"39_CR22","doi-asserted-by":"crossref","first-page":"3693","DOI":"10.1109\/JSEN.2013.2266116","volume":"13","author":"X Yao","year":"2013","unstructured":"Yao, X., Han, X., Xiaojiang, D., Zhou, X.: A lightweight multicast authentication mechanism for small scale IoT applications. IEEE Sens. J. 13(10), 3693\u20133701 (2013)","journal-title":"IEEE Sens. J."}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69471-9_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,23]],"date-time":"2017-10-23T13:12:09Z","timestamp":1508764329000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69471-9_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319694702","9783319694719"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69471-9_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}