{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T18:09:45Z","timestamp":1774721385449,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540681595","type":"print"},{"value":"9783540681649","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-68164-9_8","type":"book-chapter","created":{"date-parts":[[2008,5,30]],"date-time":"2008-05-30T10:48:34Z","timestamp":1212144514000},"page":"109-124","source":"Crossref","is-referenced-by-count":53,"title":["An Authentication Protocol with Encrypted Biometric Data"],"prefix":"10.1007","author":[{"given":"Julien","family":"Bringer","sequence":"first","affiliation":[]},{"given":"Herv\u00e9","family":"Chabanne","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"8_CR1","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/JPROC.2005.862423","volume":"94","author":"R. Anderson","year":"2006","unstructured":"Anderson, R., Bond, M., Clulow, J., Skorobogatov, S.: Cryptographic processors-a survey. Proceedings of the IEEE\u00a094(2), 357\u2013369 (2006)","journal-title":"Proceedings of the IEEE"},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/11507840_32","volume-title":"Financial Cryptography and Data Security","author":"M.J. Atallah","year":"2005","unstructured":"Atallah, M.J., Frikken, K.B., Goodrich, M.l.T., Tamassia, R.: Secure biometric authentication for weak computational devices. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, vol.\u00a03570, pp. 357\u2013371. Springer, Heidelberg (2005)"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1145\/1030083.1030096","volume-title":"CCS 2004: Proceedings of the 11th ACM conference on Computer and communications security","author":"X. Boyen","year":"2004","unstructured":"Boyen, X.: Reusable cryptographic fuzzy extractors. In: Atluri, V., Pfitzmann, B., McDaniel, P.D. (eds.) CCS 2004: Proceedings of the 11th ACM conference on Computer and communications security, pp. 82\u201391. ACM Press, New York (2004)"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/11426639_9","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"X. Boyen","year":"2005","unstructured":"Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., Smith, A.: Secure remote authentication using biometric data. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 147\u2013163. Springer, Heidelberg (2005)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Bringer, J., Chabanne, H., Cohen, G., Kindarji, B., Z\u00e9mor, G.: Optimal iris fuzzy sketches. In: IEEE First International Conference on Biometrics: Theory, Applications and Systems, BTAS 2007 (2007)","DOI":"10.1109\/BTAS.2007.4401904"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/978-3-540-73458-1_8","volume-title":"Information Security and Privacy","author":"J. Bringer","year":"2007","unstructured":"Bringer, J., Chabanne, H., Izabach\u00e8ne, M., Pointcheval, D., Tang, Q., Zimmer, S.: An application of the Goldwasser-Micali cryptosystem to biometric authentication. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol.\u00a04586, pp. 96\u2013106. Springer, Heidelberg (2007)"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Bringer, J., Chabanne, H., Kindarji, B.: The best of both worlds: Applying secure sketches to cancelable biometrics. Science of Computer Programming (to appear, Presented at WISSec 2007)","DOI":"10.1016\/j.scico.2008.09.016"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-540-76969-9_12","volume-title":"Cryptology and Network Security","author":"J. Bringer","year":"2007","unstructured":"Bringer, J., Chabanne, H., Pointcheval, D., Tang, Q.: Extended private information retrieval and its application in biometrics authentications. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, vol.\u00a04856, pp. 175\u2013193. Springer, Heidelberg (2007)"},{"key":"8_CR9","first-page":"180","volume-title":"AutoID","author":"J. Bringer","year":"2007","unstructured":"Bringer, J., Chabanne, H., Tang, Q.: An application of the Naccache-Stern knapsack cryptosystem to biometric authentication. In: AutoID, pp. 180\u2013185. IEEE, Los Alamitos (2007)"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","first-page":"50","volume-title":"Information Security and Privacy","author":"Y.-C. Chang","year":"2004","unstructured":"Chang, Y.-C.: Single database private information retrieval with logarithmic communication. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol.\u00a03108, pp. 50\u201361. Springer, Heidelberg (2004)"},{"key":"8_CR11","unstructured":"Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: FOCS, pp. 41\u201350 (1995)"},{"issue":"6","key":"8_CR12","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1145\/293347.293350","volume":"45","author":"B. Chor","year":"1998","unstructured":"Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM\u00a045(6), 965\u2013981 (1998)","journal-title":"J. ACM"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1007\/11507840_22","volume-title":"Financial Cryptography and Data Security","author":"G.D. Crescenzo","year":"2005","unstructured":"Crescenzo, G.D., Graveman, R., Ge, R., Arce, G.: Approximate message authentication and biometric entity authentication. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, vol.\u00a03570, pp. 240\u2013254. Springer, Heidelberg (2005)"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/3-540-44586-2_9","volume-title":"Public Key Cryptography","author":"I. Damg\u00e5rd","year":"2001","unstructured":"Damg\u00e5rd, I., Jurik, M.: A generalisation, a simplification and some applications of Paillier\u2019s probabilistic public-key system. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol.\u00a01992, pp. 119\u2013136. Springer, Heidelberg (2001)"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1007\/3-540-45067-X_30","volume-title":"Information Security and Privacy","author":"I. Damg\u00e5rd","year":"2003","unstructured":"Damg\u00e5rd, I., Jurik, M.: A length-flexible threshold cryptosystem with applications. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol.\u00a02727, pp. 350\u2013364. Springer, Heidelberg (2003)"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/11818175_14","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"Y. Dodis","year":"2006","unstructured":"Dodis, Y., Katz, J., Reyzin, L., Smith, A.: Robust fuzzy extractors and authenticated key agreement from close secrets. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.\u00a04117, pp. 232\u2013250. Springer, Heidelberg (2006)"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/978-3-540-24676-3_31","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"Y. Dodis","year":"2004","unstructured":"Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 523\u2013540. Springer, Heidelberg (2004)"},{"key":"8_CR18","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/508171.508174","volume-title":"NSPW 2001: Proceedings of the 2001 workshop on New security paradigms","author":"W. Du","year":"2001","unstructured":"Du, W., Atallah, M.J.: Secure multi-party computation problems and their applications: a review and open problems. In: NSPW 2001: Proceedings of the 2001 workshop on New security paradigms, pp. 13\u201322. ACM Press, New York (2001)"},{"issue":"3","key":"8_CR19","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1145\/1159892.1159900","volume":"2","author":"J. Feigenbaum","year":"2006","unstructured":"Feigenbaum, J., Ishai, Y., Malkin, T., Nissim, K., Strauss, M.J., Wright, R.N.: Secure multiparty computation of approximations. ACM Transactions on Algorithms\u00a02(3), 435\u2013472 (2006)","journal-title":"ACM Transactions on Algorithms"},{"key":"8_CR20","unstructured":"Gasarch, W.: A survey on private information retrieval, http:\/\/www.cs.umd.edu\/gasarch\/pir\/pir.html"},{"key":"8_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"803","DOI":"10.1007\/11523468_65","volume-title":"Automata, Languages and Programming","author":"C. Gentry","year":"2005","unstructured":"Gentry, C., Ramzan, Z.: Single-database private information retrieval with constant communication rate. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol.\u00a03580, pp. 803\u2013815. Springer, Heidelberg (2005)"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. In: STOC, pp. 151\u2013160 (1998)","DOI":"10.1145\/276698.276723"},{"key":"8_CR23","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1145\/800070.802212","volume-title":"Proceedings of the Fourteenth Annual ACM Symposium on Theory of Computing","author":"S. Goldwasser","year":"1982","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption and how to play mental poker keeping secret all partial information. In: Proceedings of the Fourteenth Annual ACM Symposium on Theory of Computing, San Francisco, California, USA, May 5-7, 1982, pp. 365\u2013377. ACM, New York (1982)"},{"issue":"9","key":"8_CR24","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/TC.2006.138","volume":"55","author":"F. Hao","year":"2006","unstructured":"Hao, F., Anderson, R., Daugman, J.: Combining crypto with biometrics effectively. IEEE Transactions on Computers\u00a055(9), 1081\u20131088 (2006)","journal-title":"IEEE Transactions on Computers"},{"issue":"2","key":"8_CR25","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10623-005-6343-z","volume":"38","author":"A. Juels","year":"2006","unstructured":"Juels, A., Sudan, M.: A fuzzy vault scheme. Des. Codes Cryptography\u00a038(2), 237\u2013257 (2006)","journal-title":"Des. Codes Cryptography"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: ACM Conference on Computer and Communications Security, pp. 28\u201336 (1999)","DOI":"10.1145\/319709.319714"},{"key":"8_CR27","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/AUTOID.2005.24","volume-title":"AUTOID 2005: Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies","author":"T.A.M. Kevenaar","year":"2005","unstructured":"Kevenaar, T.A.M., Schrijen, G.J., van der Veen, M., Akkermans, A.H.M., Zuo, F.: Face recognition with renewable and privacy preserving binary templates. In: AUTOID 2005: Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies, pp. 21\u201326. IEEE Computer Society, Washington (2005)"},{"key":"8_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/3-540-44887-X_47","volume-title":"Audio-and Video-Based Biometrie Person Authentication","author":"J.-P.M.G. Linnartz","year":"2003","unstructured":"Linnartz, J.-P.M.G., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol.\u00a02688, pp. 393\u2013402. Springer, Heidelberg (2003)"},{"key":"8_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1007\/11556992_23","volume-title":"Information Security","author":"H. Lipmaa","year":"2005","unstructured":"Lipmaa, H.: An oblivious transfer protocol with log-squared communication. In: Zhou, J., L\u00f3pez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol.\u00a03650, pp. 314\u2013328. Springer, Heidelberg (2005)"},{"key":"8_CR30","unstructured":"Ostrovsky, R., Skeith III., W.E.: A survey of single database PIR: Techniques and applications. Cryptology ePrint Archive: Report 2007\/059 (2007)"},{"key":"8_CR31","series-title":"Lecture Notes in Computer Science","first-page":"223","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P. Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"key":"8_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1007\/11761679_31","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"B. Schoenmakers","year":"2006","unstructured":"Schoenmakers, B., Tuyls, P.: Efficient binary conversion for Paillier encrypted values. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol.\u00a04004, pp. 522\u2013537. Springer, Heidelberg (2006)"},{"key":"8_CR33","unstructured":"Sion, R., Carbunar, B.: On the computational practicality of private information retrieval. In: Network and Distributed System Security Symposium NDSS (2007)"},{"key":"8_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1007\/11527923_45","volume-title":"Audio- and Video-Based Biometric Person Authentication","author":"P. Tuyls","year":"2005","unstructured":"Tuyls, P., Akkermans, A.H.M., Kevenaar, T.A.M., Schrijen, G.J., Bazen, A.M., Veldhuis, R.N.J.: Practical biometric authentication with template protection. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol.\u00a03546, pp. 436\u2013446. Springer, Heidelberg (2005)"},{"key":"8_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/978-3-540-25976-3_15","volume-title":"Biometric Authentication","author":"P. Tuyls","year":"2004","unstructured":"Tuyls, P., Goseling, J.: Capacity and examples of template-protecting biometric authentication systems. In: Maltoni, D., Jain, A.K. (eds.) BioAW 2004. LNCS, vol.\u00a03087, pp. 158\u2013170. Springer, Heidelberg (2004)"},{"key":"8_CR36","unstructured":"Tuyls, P., Verbitskiy, E., Goseling, J., Denteneer, D.: Privacy protecting biometric authentication systems: an overview. In: EUSIPCO 2004 (2004)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68164-9_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:38:59Z","timestamp":1620016739000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68164-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540681595","9783540681649"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68164-9_8","relation":{},"subject":[]}}