{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T19:17:29Z","timestamp":1768072649835,"version":"3.49.0"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,2,18]],"date-time":"2022-02-18T00:00:00Z","timestamp":1645142400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,2,18]],"date-time":"2022-02-18T00:00:00Z","timestamp":1645142400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2022,8]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In an asymmetric-key cryptosystem, the secure storage of private keys is a challenging task. This paper proposes a novel approach for generating the same public and private key pair on a need basis. Hence, the need for secure storage of the private key is done away with. The proposed approach for generating the key pair is based on two factors: fingerprint biometrics and password. A stable binary string is generated from the distances among pairs of minutiae points in a fingerprint using a gray code-based method. Experiments show that gray code representation significantly reduces the number of inconsistencies between the generated bit strings from two instances of the same fingerprint as against the binary code representation. Hence, the Reed\u2013Solomon error correction code successfully corrects errors due to variations in multiple instances of the same fingerprint to induce stability in the generated string. Hash of the stable string generated from the fingerprint and the string generated from hashed password are XORed to derive a stable seed value. The proposed approach uses this seed value to generate two large prime numbers. These prime numbers are used to generate the public and private key pair using the RSA key generation method. This seed value ensures the generation of the same key pair every time. The experimental results show that the proposed approach can ensure a stable generation of the key. It is not required to store either the fingerprint template or the password. Moreover, the generated private key is also not stored. It can be regenerated on a need basis.<\/jats:p>","DOI":"10.1007\/s40747-022-00663-3","type":"journal-article","created":{"date-parts":[[2022,2,18]],"date-time":"2022-02-18T09:04:58Z","timestamp":1645175098000},"page":"3247-3261","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Two-factor-based RSA key generation from fingerprint biometrics and password for secure communication"],"prefix":"10.1007","volume":"8","author":[{"given":"K.","family":"Suresh","sequence":"first","affiliation":[]},{"given":"Rajarshi","family":"Pal","sequence":"additional","affiliation":[]},{"given":"S. R.","family":"Balasundaram","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,18]]},"reference":[{"key":"663_CR1","unstructured":"Cimpanu C (2020) https:\/\/www.zdnet.com\/article\/ malicious-chrome-extension-caught-stealing-ledger-wallet-recovery-seeds. Accessed 28 June 2021"},{"key":"663_CR2","unstructured":"Gatlan S (2019) https:\/\/www.bleepingcomputer.com\/news\/security\/over-435k-security-certs-can-be-compromised-with-less-than-3-000. Accessed 28 June 2021"},{"issue":"9","key":"663_CR3","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/TC.2006.138","volume":"55","author":"F Hao","year":"2006","unstructured":"Hao F, Anderson R, Daugman J (2006) Combining crypto with biometrics effectively. IEEE Trans Comput 55(9):1081\u20131088. https:\/\/doi.org\/10.1109\/TC.2006.138","journal-title":"IEEE Trans Comput"},{"key":"663_CR4","doi-asserted-by":"crossref","unstructured":"Popa D, Simion E (2017) Enhancing security by combining biometrics and cryptography. In: Proceedings of 9th International Conference on Electronics, Computers and Artificial Intelligence. IEEE, pp 1\u20137","DOI":"10.1109\/ECAI.2017.8166461"},{"issue":"6","key":"663_CR5","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1109\/JPROC.2004.827372","volume":"92","author":"U Uludag","year":"2004","unstructured":"Uludag U, Pankanti S, Prabhakar S, Jain AK (2004) Biometric cryptosystem: issues and challenges. Proc IEEE 92(6):948\u2013960. https:\/\/doi.org\/10.1109\/JPROC.2004.827372","journal-title":"Proc IEEE"},{"key":"663_CR6","volume-title":"Handbook of fingerprint recognition","author":"D Maltoni","year":"2003","unstructured":"Maltoni D, Maio D, Jain AK, Prabhakar S (2003) Handbook of fingerprint recognition. Springer, New York"},{"issue":"2","key":"663_CR7","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s10623-005-6343-z","volume":"38","author":"A Juels","year":"2006","unstructured":"Juels A, Sudan M (2006) A fuzzy vault scheme. Des Codes Crypt 38(2):237\u2013257. https:\/\/doi.org\/10.1007\/s10623-005-6343-z","journal-title":"Des Codes Crypt"},{"key":"663_CR8","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1016\/j.comcom.2020.01.077","volume":"153","author":"RK Mahendran","year":"2020","unstructured":"Mahendran RK, Velusamy P (2020) A secure fuzzy extractor based biometric key authentication scheme for body sensor network in Internet of Medical Things. Comput Commun 153:545\u2013552. https:\/\/doi.org\/10.1016\/j.comcom.2020.01.077","journal-title":"Comput Commun"},{"key":"663_CR9","doi-asserted-by":"crossref","unstructured":"Juels A, Wattenberg M (1999) A fuzzy commitment scheme. In: Proceedings of ACM 6th conference on computer and communications security, ACM, pp 28\u201336","DOI":"10.1145\/319709.319714"},{"issue":"2","key":"663_CR10","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1049\/iet-bmt.2016.0061","volume":"6","author":"S Adamovic","year":"2017","unstructured":"Adamovic S et al (2017) Fuzzy commitment scheme for generation of cryptographic keys based on iris biometrics. IET Biometric 6(2):89\u201396. https:\/\/doi.org\/10.1049\/iet-bmt.2016.0061","journal-title":"IET Biometric"},{"key":"663_CR11","doi-asserted-by":"publisher","unstructured":"Kausar F (2021) Iris based cancelable biometric cryptosystem for secure healthcare smart card. Egypt Inf J. pp 1\u20137. https:\/\/doi.org\/10.1016\/j.eij.2021.01.004","DOI":"10.1016\/j.eij.2021.01.004"},{"key":"663_CR12","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1016\/j.compeleceng.2018.01.028","volume":"69","author":"G Panchal","year":"2018","unstructured":"Panchal G, Samanta D (2018) A novel approach to fingerprint-biometric based cryptographic key generation and its applications to storage security. Comput Electr Eng 69:461\u2013478. https:\/\/doi.org\/10.1016\/j.compeleceng.2018.01.028","journal-title":"Comput Electr Eng"},{"key":"663_CR13","doi-asserted-by":"crossref","unstructured":"Suresh K, Pal R, Balasundaram SR (2019) Fingerprint based cryptographic key generation. In: Proceedings of international conference on intelligent data communication technologies and internet of things, Springer, New York, pp 704\u2013713","DOI":"10.1007\/978-3-030-34080-3_79"},{"key":"663_CR14","doi-asserted-by":"crossref","unstructured":"Panchal G, Samanta D (2016) Comparative features and same cryptographic key generation using biometric fingerprints. In: Proceedings of 2nd international conference on advances in electrical, electronics, information, communication and bio-informatics, IEEE, pp 1\u20135","DOI":"10.1109\/AEEICB.2016.7538381"},{"key":"663_CR15","doi-asserted-by":"crossref","unstructured":"Barman S, Chattopadhyay S, Samanta D (2014) Fingerprint based symmetric cryptography. In: Proceedings of international conference on high performance computing and applications, IEEE, pp 1\u20136","DOI":"10.1109\/ICHPCA.2014.7045306"},{"key":"663_CR16","doi-asserted-by":"crossref","unstructured":"Barman S, Samanta D, Chattopadhyay S (2015) Revocable key generation from irrevocable biometric data for symmetric cryptography. In: Proceedings of 3rd international conference on computer, communication, control and information technology, IEEE, pp 1\u20134","DOI":"10.1109\/C3IT.2015.7060182"},{"key":"663_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.patcog.2020.107733","volume":"111","author":"P Wang","year":"2021","unstructured":"Wang P et al (2021) Biometric key generation based on generated intervals and two-layer error correcting technique. Pattern Recogn 111:1\u201337. https:\/\/doi.org\/10.1016\/j.patcog.2020.107733","journal-title":"Pattern Recogn"},{"key":"663_CR18","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1016\/j.ins.2016.12.048","volume":"433\u2013434","author":"Z Wu","year":"2018","unstructured":"Wu Z et al (2018) Generating stable biometric keys for flexible cloud computing authentication using finger vein. Inf Sci 433\u2013434:431\u2013447. https:\/\/doi.org\/10.1016\/j.ins.2016.12.048","journal-title":"Inf Sci"},{"key":"663_CR19","doi-asserted-by":"crossref","unstructured":"Rathgeb C, Uhl A (2009) Context-based texture analysis for secure revocable iris biometric key generation. In: Proceedings of 3rd international conference on imaging for crime detection and prevention, IEEE, pp 1\u20136","DOI":"10.1049\/ic.2009.0229"},{"issue":"7","key":"663_CR20","doi-asserted-by":"publisher","first-page":"2919","DOI":"10.3837\/tiis.2020.07.011","volume":"14","author":"A Kim","year":"2020","unstructured":"Kim A, Wang C, Seo S (2020) PCA-CIA ensemble-based feature extraction for bio-key generation. KSII Trans Internet Inf Syst 14(7):2919\u20132937. https:\/\/doi.org\/10.3837\/tiis.2020.07.011","journal-title":"KSII Trans Internet Inf Syst"},{"key":"663_CR21","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.patcog.2017.11.018","volume":"77","author":"A Anees","year":"2018","unstructured":"Anees A, Chen Y-PP (2018) Discriminative binary feature learning and quantization in biometric key generation. Pattern Recogn 77:289\u2013305. https:\/\/doi.org\/10.1016\/j.patcog.2017.11.018","journal-title":"Pattern Recogn"},{"key":"663_CR22","doi-asserted-by":"crossref","unstructured":"Monrose F, Reiter M K, Li Q, Wetzel S (2001) Cryptographic key generation from voice. In: Proceedings of IEEE symposium on security and privacy, pp 202\u2013213","DOI":"10.1109\/SECPRI.2001.924299"},{"issue":"9","key":"663_CR23","doi-asserted-by":"publisher","first-page":"1205","DOI":"10.1109\/TSMC.2015.2389768","volume":"45","author":"W Sheng","year":"2015","unstructured":"Sheng W et al (2015) A biometric key generation method based on semi supervised data clustering. IEEE Trans Syst Man Cybern Syst 45(9):1205\u20131217. https:\/\/doi.org\/10.1109\/TSMC.2015.2389768","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"issue":"1","key":"663_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3023954","volume":"13","author":"W Xu","year":"2017","unstructured":"Xu W et al (2017) Gait-Key: a gait based shared secret key generation protocol for wearable devices. ACM Trans Sensor Netw 13(1):1\u201327. https:\/\/doi.org\/10.1145\/3023954","journal-title":"ACM Trans Sensor Netw"},{"issue":"3","key":"663_CR25","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1109\/JBHI.2018.2860780","volume":"23","author":"Y Sun","year":"2019","unstructured":"Sun Y, Lo B (2019) An artificial neural network framework for gait based biometrics. IEEE J Biomed Health Inf 23(3):987\u2013998. https:\/\/doi.org\/10.1109\/JBHI.2018.2860780","journal-title":"IEEE J Biomed Health Inf"},{"issue":"1","key":"663_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3381004","volume":"4","author":"Y Wu","year":"2020","unstructured":"Wu Y, Lin Q, Jia H, Hassan M, Hu W (2020) Auto-key: using autoencoder to speed up gait-based key generation in body area networks. Proc ACM Interact Mob Wear Ubiquit Technol 4(1):1\u201323. https:\/\/doi.org\/10.1145\/3381004","journal-title":"Proc ACM Interact Mob Wear Ubiquit Technol"},{"issue":"3","key":"663_CR27","doi-asserted-by":"publisher","first-page":"1636","DOI":"10.1109\/JIOT.2020.3014646","volume":"8","author":"F Sun","year":"2021","unstructured":"Sun F, Zang W, Huang H, Farkhatdinov I, Li Y (2021) Accelerometer-based key generation and distribution method for wearable IoT devices. IEEE Internet Things J 8(3):1636\u20131650. https:\/\/doi.org\/10.1109\/JIOT.2020.3014646","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"663_CR28","doi-asserted-by":"publisher","first-page":"1400","DOI":"10.1109\/TBME.2016.2607020","volume":"64","author":"N Karimian","year":"2017","unstructured":"Karimian N, Guo Z, Tehranipoor M, Forte D (2017) Highly reliable key generation from electrocardiogram (ECG). IEEE Trans Biomed Eng 64(6):1400\u20131411. https:\/\/doi.org\/10.1109\/TBME.2016.2607020","journal-title":"IEEE Trans Biomed Eng"},{"key":"663_CR29","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1109\/ACCESS.2017.2766523","volume":"6","author":"SR Moosavi","year":"2017","unstructured":"Moosavi SR et al (2017) Low-latency approach for secure ECG feature based cryptographic key generation. IEEE Access 6:428\u2013442. https:\/\/doi.org\/10.1109\/ACCESS.2017.2766523","journal-title":"IEEE Access"},{"issue":"9","key":"663_CR30","doi-asserted-by":"publisher","first-page":"6823","DOI":"10.1007\/s11042-019-08507-y","volume":"79","author":"ND Roy","year":"2020","unstructured":"Roy ND, Biswas A (2020) Fast and robust retinal biometric key generation using deep neural nets. Multimed Tools Appl 79(9):6823\u20136843. https:\/\/doi.org\/10.1007\/s11042-019-08507-y","journal-title":"Multimed Tools Appl"},{"key":"663_CR31","doi-asserted-by":"publisher","first-page":"6141","DOI":"10.1007\/s12652-020-02184-8","volume":"12","author":"T Joseph","year":"2021","unstructured":"Joseph T et al (2021) A multi modal biometric authentication scheme based on feature fusion for improving security in cloud environment. J Ambient Intell Hum Comput 12:6141\u20136149. https:\/\/doi.org\/10.1007\/s12652-020-02184-8","journal-title":"J Ambient Intell Hum Comput"},{"issue":"10","key":"663_CR32","doi-asserted-by":"publisher","first-page":"2680","DOI":"10.1109\/JSSC.2020.3010705","volume":"55","author":"SK Cherupally","year":"2020","unstructured":"Cherupally SK et al (2020) A smart hardware security engine combining entropy sources of ECG, HRV, and SRAM PUF for authentication and secret key generation. IEEE J Solid-State Circ 55(10):2680\u20132690. https:\/\/doi.org\/10.1109\/JSSC.2020.3010705","journal-title":"IEEE J Solid-State Circ"},{"key":"663_CR33","doi-asserted-by":"crossref","unstructured":"Yang H, Wu Z (2019) A Biometric key generation method for fingerprint and finger vein fusion. In: Proceedings of international symposium on cyberspace safety and security, Springer, New York, pp 293\u2013300","DOI":"10.1007\/978-3-030-37352-8_26"},{"key":"663_CR34","doi-asserted-by":"crossref","unstructured":"Sarkar A, Singh B K, Bhaumik U (2017) RSA Key Generation from Cancelable Fingerprint Biometrics. In: Proceedings of International Conference on Computing, Communication, Control and Automation. IEEE, pp.1\u20136","DOI":"10.1109\/ICCUBEA.2017.8463959"},{"key":"663_CR35","doi-asserted-by":"publisher","first-page":"1495","DOI":"10.1007\/s12652-019-01437-5","volume":"11","author":"R Dwivedi","year":"2020","unstructured":"Dwivedi R, Dey S, Sharma MA, Goel A (2020) A fingerprint based crypto-biometric system for secure communication. J Ambient Intell Hum Comput 11:1495\u20131509. https:\/\/doi.org\/10.1007\/s12652-019-01437-5","journal-title":"J Ambient Intell Hum Comput"},{"key":"663_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-417X-2011-3","volume":"3","author":"C Rathgeb","year":"2011","unstructured":"Rathgeb C, Uhl A (2011) A survey on biometric cryptosystem and cancelable biometrics. EURASIP J Inf Secur 3:1\u201325. https:\/\/doi.org\/10.1186\/1687-417X-2011-3","journal-title":"EURASIP J Inf Secur"},{"issue":"5","key":"663_CR37","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1109\/TIFS.2015.2392559","volume":"10","author":"B Tams","year":"2015","unstructured":"Tams B, Mihailescu P, Munk A (2015) Security considerations in minutiae-based fuzzy vaults. IEEE Trans Inf Forensics Secur 10(5):985\u2013998. https:\/\/doi.org\/10.1109\/TIFS.2015.2392559","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"663_CR38","doi-asserted-by":"publisher","first-page":"26979","DOI":"10.1007\/s11042-017-4528-x","volume":"78","author":"G Panchal","year":"2019","unstructured":"Panchal G, Samanta D, Barman S (2019) Biometric-based cryptography for digital content protection without any key storage. Multimed Tools Appl 78:26979\u201327000. https:\/\/doi.org\/10.1007\/s11042-017-4528-x","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"663_CR39","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1504\/ijbm.2015.071946","volume":"7","author":"S Barman","year":"2015","unstructured":"Barman S, Samanta D, Chattopadhyay S (2015) Approach to cryptographic key generation from fingerprint biometrics. Int J Biometric 7(3):226\u2013248. https:\/\/doi.org\/10.1504\/ijbm.2015.071946","journal-title":"Int J Biometric"},{"key":"663_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13635-015-0020-1","volume":"3","author":"S Barman","year":"2015","unstructured":"Barman S, Samanta D, Chattopadhyay S (2015) Fingerprint based crypto biometric system for network security. EURASIP J Inf Secur 3:1\u201317. https:\/\/doi.org\/10.1186\/s13635-015-0020-1","journal-title":"EURASIP J Inf Secur"},{"key":"663_CR41","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.compeleceng.2016.11.017","volume":"64","author":"S Barman","year":"2017","unstructured":"Barman S, Chattopadhyay S, Samanta D, Panchal G (2017) A novel secure key-exchange protocol using biometrics of the sender and receiver. Comput Electr Eng 64:65\u201382. https:\/\/doi.org\/10.1016\/j.compeleceng.2016.11.017","journal-title":"Comput Electr Eng"},{"key":"663_CR42","doi-asserted-by":"publisher","first-page":"799","DOI":"10.1007\/s11042-020-09375-7","volume":"80","author":"A Sarkar","year":"2021","unstructured":"Sarkar A, Singh BK (2021) A multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function. Multimed Tools Appl 80:799\u2013829. https:\/\/doi.org\/10.1007\/s11042-020-09375-7","journal-title":"Multimed Tools Appl"},{"key":"663_CR43","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.1007\/s13198-019-00832-7","volume":"10","author":"A Sarkar","year":"2019","unstructured":"Sarkar A, Singh BK (2019) A cancelable biometric based secure session key agreement protocol employing elliptic curve cryptography. Int J Syst Assur Eng Manag 10:1023\u20131042. https:\/\/doi.org\/10.1007\/s13198-019-00832-7","journal-title":"Int J Syst Assur Eng Manag"},{"key":"663_CR44","doi-asserted-by":"publisher","first-page":"21645","DOI":"10.1007\/s11042-019-7426-6","volume":"78","author":"A Sarkar","year":"2019","unstructured":"Sarkar A, Singh BK (2019) A cancelable fingerprint biometric based session key establishment protocol. Multimed Tools Appl 78:21645\u201321671. https:\/\/doi.org\/10.1007\/s11042-019-7426-6","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"663_CR45","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/34.587996","volume":"19","author":"A Jain","year":"1997","unstructured":"Jain A, Hong L, Bolle R (1997) On-line fingerprint verification. IEEE Trans Pattern Anal Mach Intell 19(4):302\u2013314. https:\/\/doi.org\/10.1109\/34.587996","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"663_CR46","unstructured":"Wayne J S, Kenneth K (2014) NBIS NIST Tool. [online] https:\/\/www.nist.gov\/services-resources\/software\/fingerprint-minutiae-viewer-fpmv"},{"key":"663_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.patcog.2020.107733","volume":"111","author":"P Wang","year":"2021","unstructured":"Wang P et al (2021) Biometric key generation based on generated intervals and two-layer error correcting technique. Pattern Recogn 111:1\u201339. https:\/\/doi.org\/10.1016\/j.patcog.2020.107733","journal-title":"Pattern Recogn"},{"key":"663_CR48","unstructured":"Stephen BW, Vijay KB (eds) (1999) Reed-Solomon codes and their applications. IEEE Press"},{"key":"663_CR49","doi-asserted-by":"crossref","unstructured":"Turan MS, Barker E, Burr W, Chen L (2010) Recommendation for password-based key derivation. NIST Special Publication 800-132. https:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistsp ecialpublication800-132.pdf","DOI":"10.6028\/NIST.SP.800-132"},{"issue":"9","key":"663_CR50","doi-asserted-by":"publisher","first-page":"3292","DOI":"10.1109\/tit.2005.853307","volume":"51","author":"FF Yao","year":"2005","unstructured":"Yao FF, Yin YL (2005) Design and analysis of password-based key derivation functions. IEEE Trans Inf Theory 51(9):3292\u20133297. https:\/\/doi.org\/10.1109\/tit.2005.853307","journal-title":"IEEE Trans Inf Theory"},{"key":"663_CR51","doi-asserted-by":"crossref","unstructured":"Zhou J et al (2012) On the security of key derivation functions in office. In: Proceedings of international workshop on anti-counterfeiting, security, and identification, IEEE, pp 1\u20135","DOI":"10.1109\/ICASID.2012.6325279"},{"key":"663_CR52","unstructured":"Grassi PA et al (2017) Digital identity guidelines: authentication and lifecycle management. Special Publication (NIST SP)-800-63B. https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublicati ons\/NIST.SP.800-63b.pdf"},{"issue":"1","key":"663_CR53","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1017\/S0956796808007004","volume":"19","author":"ME O\u2019neill","year":"2009","unstructured":"O\u2019neill ME (2009) The genuine sieve of Eratosthenes. J Funct Program 19(1):95\u2013106. https:\/\/doi.org\/10.1017\/S0956796808007004","journal-title":"J Funct Program"},{"key":"663_CR54","doi-asserted-by":"publisher","unstructured":"Agrawal M, Kayal N, Saxena N (2004) Primes is in P. Annals of Mathematics. 160(2):781\u2013793. https:\/\/doi.org\/10.4007\/annals.2004.160.781","DOI":"10.4007\/annals.2004.160.781"},{"key":"663_CR55","doi-asserted-by":"crossref","unstructured":"Albrecht M R, Massimo J, Paterson KG, Somorovsky J (2018) Prime and Prejudice: Primality Testing Under Adversarial Conditions. In: Proceedings of ACM SIGSAC conference on computer and communications security, pp 281\u2013298","DOI":"10.1145\/3243734.3243787"},{"key":"663_CR56","unstructured":"FVC 2002 Database. [online] http:\/\/bias.csr.unibo.it\/fvc2002\/databases.asp"},{"key":"663_CR57","doi-asserted-by":"crossref","unstructured":"Kaur M, Sofat S (2016) Secure fingerprint fuzzy vault using hadamard transformation to defy correlation attack. In: Proceedings of 6th International Symposium on Embedded Computing and System Design, IEEE, pp 122\u2013126","DOI":"10.1109\/ISED.2016.7977067"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00663-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-022-00663-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00663-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T10:30:43Z","timestamp":1659522643000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-022-00663-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,18]]},"references-count":57,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["663"],"URL":"https:\/\/doi.org\/10.1007\/s40747-022-00663-3","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,18]]},"assertion":[{"value":"26 August 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}