{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T14:17:32Z","timestamp":1772893052699,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2019,2,23]],"date-time":"2019-02-23T00:00:00Z","timestamp":1550880000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s10207-019-00428-z","type":"journal-article","created":{"date-parts":[[2019,2,23]],"date-time":"2019-02-23T11:25:24Z","timestamp":1550921124000},"page":"581-617","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Signature schemes with a fuzzy private key"],"prefix":"10.1007","volume":"18","author":[{"given":"Kenta","family":"Takahashi","sequence":"first","affiliation":[]},{"given":"Takahiro","family":"Matsuda","sequence":"additional","affiliation":[]},{"given":"Takao","family":"Murakami","sequence":"additional","affiliation":[]},{"given":"Goichiro","family":"Hanaoka","sequence":"additional","affiliation":[]},{"given":"Masakatsu","family":"Nishigaki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,23]]},"reference":[{"key":"428_CR1","doi-asserted-by":"crossref","unstructured":"Barak, B., Dodis, Y., Krawczyk, H., Pereira, O., Pietrzak, K., Standaert, F.-X., Yu, Y.: Leftover hash lemma, revisited. In: CRYPTO 2011, LNCS 6841, pp. 1\u201320 (2011)","DOI":"10.1007\/978-3-642-22792-9_1"},{"key":"428_CR2","doi-asserted-by":"crossref","unstructured":"Bellare, M., Cash, D., Miller, R.: Cryptography secure against related-key attacks and tampering. In: ASIACRYPT 2011, LNCS 7073, pp. 486\u2013503 (2011)","DOI":"10.1007\/978-3-642-25385-0_26"},{"key":"428_CR3","doi-asserted-by":"crossref","unstructured":"Bellare, M., Neven, G.: Multi-signatures in the plain public-key model and a general forking lemma. In: CCS 2006, pp. 390\u2013399 (2006)","DOI":"10.1145\/1180405.1180453"},{"key":"428_CR4","doi-asserted-by":"crossref","unstructured":"Cheraghchi, M.: Capacity Achieving Codes from Randomness Condensers, 2011. arxiv:0901.1866v2.pdf . Preliminary version appeared in ISIT (2009)","DOI":"10.1109\/ISIT.2009.5205931"},{"key":"428_CR5","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-1-4471-4402-1_12","volume-title":"Handbook of Iris Recognition","author":"R Connaughton","year":"2013","unstructured":"Connaughton, R., Bowyer, K.W., Flynn, P.J.: Fusion of face and iris biometrics, chapter 12. In: Burge, M.J., Bowyer, K.W. (eds.) Handbook of Iris Recognition, pp. 219\u2013237. Springer, Berlin (2013)"},{"issue":"2","key":"428_CR6","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/S0031-3203(02)00030-4","volume":"36","author":"J Daugman","year":"2003","unstructured":"Daugman, J.: The importance of being random: statistical principles of iris recognition. Pattern Recogn. 36(2), 279\u2013291 (2003)","journal-title":"Pattern Recogn."},{"issue":"1","key":"428_CR7","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TCSVT.2003.818350","volume":"14","author":"J Daugman","year":"2004","unstructured":"Daugman, J.: How iris recognition works. IEEE Trans. Circuits Syst. Video Technol. 14(1), 21\u201330 (2004)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"1","key":"428_CR8","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y Dodis","year":"2008","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97\u2013139 (2008)","journal-title":"SIAM J. Comput."},{"key":"428_CR9","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Yu, Y.: Overcoming weak expectations. In: TCC 2013, LNCS 7785, pp. 1\u201322 (2013)","DOI":"10.1007\/978-3-642-36594-2_1"},{"issue":"1","key":"428_CR10","first-page":"1","volume":"16","author":"C Ellison","year":"2000","unstructured":"Ellison, C., Schneier, B.: Ten risks of PKI: what you\u2019re not being told about public key infrastructure. Comput. Secur. J. 16(1), 1\u20137 (2000)","journal-title":"Comput. Secur. J."},{"key":"428_CR11","first-page":"552","volume":"2009","author":"L Fan","year":"2009","unstructured":"Fan, L., Zheng, J., Yang, J.: A biometric identity based signature in the standard model. IC-NIDC 2009, 552\u2013556 (2009)","journal-title":"IC-NIDC"},{"key":"428_CR12","doi-asserted-by":"crossref","unstructured":"Fujita, M., Mano, Y., Kaneko, T., Takahashi, K., Nishigaki, M.: A micro biometric authentication mechanism considering minute patterns of the human body: a proposal and the first attempt. In: NBiS 2016, pp. 159\u2013164 (2016)","DOI":"10.1109\/NBiS.2016.13"},{"issue":"2","key":"428_CR13","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281\u2013308 (1988)","journal-title":"SIAM J. Comput."},{"issue":"4","key":"428_CR14","doi-asserted-by":"publisher","first-page":"1364","DOI":"10.1137\/S0097539793244708","volume":"28","author":"J H\u00e5stad","year":"1999","unstructured":"H\u00e5stad, J., Impagliazzo, R., Levin, L., Luby, M.: Construction of a pseudorandom generator from any one-way function. SIAM J. Comput. 28(4), 1364\u20131396 (1999)","journal-title":"SIAM J. Comput."},{"key":"428_CR15","unstructured":"ISO\/IEC JTC 1\/SC 27 24745. Biometric information protection (2011)"},{"key":"428_CR16","unstructured":"ISO\/IEC JTC 1\/SC 27 9798-3. Mechanisms using digital signature techniques (1998)"},{"key":"428_CR17","doi-asserted-by":"crossref","unstructured":"Jo, J.-G., Seo, J.-W., Lee, H.-W.: Biometric digital signature key generation and cryptography communication based on fingerprint. In: FAW 2007, LNCS 4613, pp. 38\u201349 (2007)","DOI":"10.1007\/978-3-540-73814-5_4"},{"issue":"6","key":"428_CR18","doi-asserted-by":"publisher","first-page":"1381","DOI":"10.1093\/ietcom\/e90-b.6.1381","volume":"E90\u2013B","author":"T Kwon","year":"2007","unstructured":"Kwon, T., Lee, H.H., Lee, J.: A practical method for generating digital signatures using biometrics. IEICE Trans. E90\u2013B(6), 1381\u20131389 (2007)","journal-title":"IEICE Trans."},{"key":"428_CR19","doi-asserted-by":"crossref","unstructured":"Matsuda, T., Takahashi, K., Murakami, T., Hanaoka, G.: Fuzzy signatures: relaxing the requirements and a new construction. In: ACNS 2016, LNCS 9696, pp. 97\u2013116 (2016)","DOI":"10.1007\/978-3-319-39555-5_6"},{"key":"428_CR20","doi-asserted-by":"crossref","unstructured":"Morita, H., Schuldt, J.C.N., Matsuda, T., Hanaoka, G., Iwata, T.: On the security of the Schnorr signature scheme and DSA against related-key attacks. In: ICISC 2015, LNCS 9558, pp. 20\u201335 (2016)","DOI":"10.1007\/978-3-319-30840-1_2"},{"issue":"1","key":"428_CR21","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1587\/transfun.E100.A.73","volume":"E100\u2013A","author":"H Morita","year":"2017","unstructured":"Morita, H., Schuldt, J.C.N., Matsuda, T., Hanaoka, G., Iwata, T.: On the security of the Schnorr signatures, DSA, and ElGamal signatures against related-key attacks. IEICE Trans. E100\u2013A(1), 73\u201390 (2017)","journal-title":"IEICE Trans."},{"key":"428_CR22","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.inffus.2016.02.002","volume":"32","author":"T Murakami","year":"2016","unstructured":"Murakami, T., Ohki, T., Takahashi, K.: Optimal sequential fusion for multibiometric cryptosystems. Inf. Fusion 32, 93\u2013108 (2016)","journal-title":"Inf. Fusion"},{"issue":"5589","key":"428_CR23","doi-asserted-by":"publisher","first-page":"2026","DOI":"10.1126\/science.1074376","volume":"297","author":"R Pappu","year":"2002","unstructured":"Pappu, R., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297(5589), 2026\u20132030 (2002)","journal-title":"Science"},{"issue":"1","key":"428_CR24","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","volume":"24","author":"SC Pohlig","year":"1978","unstructured":"Pohlig, S.C., Hellman, M.E.: An improved algorithm for computing logarithms over $$gf(p)$$ g f ( p ) and its cryptographic significance (corresp.). IEEE Trans. Inf. Theory 24(1), 106\u2013110 (1978)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"428_CR25","doi-asserted-by":"crossref","unstructured":"Pointcheval, D., Stern, J.: Security proofs for signature schemes. In: EUROCRYPT 1996, LNCS 1992, pp. 387\u2013398 (1996)","DOI":"10.1007\/3-540-68339-9_33"},{"issue":"143","key":"428_CR26","first-page":"918","volume":"32","author":"JM Pollard","year":"1978","unstructured":"Pollard, J.M.: Monte Carlo methods for index computation (mod $$p$$ p ). Math. Comput. 32(143), 918\u2013924 (1978)","journal-title":"Math. Comput."},{"key":"428_CR27","doi-asserted-by":"crossref","unstructured":"Raghavendra, R., Raja, K.B., Surbiryala, J., Busch, C.: A low-cost multimodal biometric sensor to capture finger vein and fingerprint. In: IJCB 2014, pp. 1\u20137 (2014)","DOI":"10.1109\/BTAS.2014.6996225"},{"key":"428_CR28","volume-title":"Handbook of Multibiometrics","author":"A Ross","year":"2006","unstructured":"Ross, A., Nandakumar, K., Jain, A.K.: Handbook of Multibiometrics. Springer, Berlin (2006)"},{"key":"428_CR29","doi-asserted-by":"crossref","unstructured":"Scheirer, W.J., Bishop, B., Boult, T.E.: Beyond PKI: the biocryptographic key infrastructure. In: WIFS 2010, pp. 1\u20136 (2010)","DOI":"10.1109\/WIFS.2010.5711435"},{"key":"428_CR30","volume-title":"Applied Cryptography","author":"B Schneier","year":"1995","unstructured":"Schneier, B.: Applied Cryptography. Wiley, New York (1995)"},{"key":"428_CR31","unstructured":"Schnorr, C.P.: Efficient signature generation for smart cards. In: CRYPTO 1989, LNCS 435, pp. 239\u2013252 (1990)"},{"key":"428_CR32","doi-asserted-by":"crossref","unstructured":"Simoens, K., Yang, B., Zhou, X., Beato, F., Busch, C., Newton, E., Preneel, B.: Criteria towards metrics for benchmarking template protection algorithms. In: ICB 2012, pp. 498\u2013505 (2012)","DOI":"10.1109\/ICB.2012.6199799"},{"key":"428_CR33","doi-asserted-by":"crossref","unstructured":"Takahashi, K., Matsuda, T., Murakami, T., Hanaoka, G., Nishigaki, M.: A signature scheme with a fuzzy private key. In: ACNS 2015. LNCS 9092, pp. 105\u2013126 (2015)","DOI":"10.1007\/978-3-319-28166-7_6"},{"key":"428_CR34","doi-asserted-by":"crossref","unstructured":"Wang, C., Chen, W., Liu, Y.: A fuzzy identity based signature scheme. In: EBISS 2009, pp. 1\u20135 (2009)","DOI":"10.1109\/EBISS.2009.5137871"},{"key":"428_CR35","doi-asserted-by":"crossref","unstructured":"Wang, C., Kim, J.-H.: Two constructions of fuzzy identity based signature. In: BMEI 2009, pp. 1\u20135 (2009)","DOI":"10.1109\/BMEI.2009.5305820"},{"key":"428_CR36","doi-asserted-by":"crossref","unstructured":"Waters, B.: Efficient identity-based encryption without random oracles. In: EUROCRYPT 2005, LNCS 3494, pp. 114\u2013127 (2005)","DOI":"10.1007\/11426639_7"},{"issue":"20","key":"428_CR37","first-page":"8405","volume":"8","author":"Q Wu","year":"2012","unstructured":"Wu, Q.: Fuzzy biometric identity-based signature in the standard model. J. Comput. Inf. Syst. 8(20), 8405\u20138412 (2012)","journal-title":"J. Comput. Inf. Syst."},{"issue":"4","key":"428_CR38","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1016\/j.compeleceng.2011.04.013","volume":"37","author":"P Yang","year":"2011","unstructured":"Yang, P., Cao, Z., Dong, X.: Fuzzy identity based signature with applications to biometric authentication. Comput. Electr. Eng. 37(4), 532\u2013540 (2011)","journal-title":"Comput. Electr. Eng."},{"key":"428_CR39","doi-asserted-by":"crossref","unstructured":"Yasuda, M., Shimoyama, T., Takenaka, M., Abe, N., Yamada, S., Yamaguchi, J.: Recovering attacks against linear sketch in fuzzy signature schemes of ACNS 2015 and 2016. In: ISPEC 2017, LNCS 10701, pp. 409\u2013421 (2017)","DOI":"10.1007\/978-3-319-72359-4_24"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-019-00428-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-019-00428-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-019-00428-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T13:35:14Z","timestamp":1662989714000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-019-00428-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,23]]},"references-count":39,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["428"],"URL":"https:\/\/doi.org\/10.1007\/s10207-019-00428-z","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,23]]},"assertion":[{"value":"23 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}