{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T01:27:05Z","timestamp":1775179625065,"version":"3.50.1"},"reference-count":51,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/btas.2018.8698601","type":"proceedings-article","created":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T23:48:37Z","timestamp":1556236117000},"page":"1-10","source":"Crossref","is-referenced-by-count":73,"title":["Secure Face Matching Using Fully Homomorphic Encryption"],"prefix":"10.1109","author":[{"given":"Vishnu","family":"Naresh Boddeti","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"2323","DOI":"10.1126\/science.290.5500.2323","article-title":"Nonlinear dimensionality reduction by locally linear embedding","volume":"290","author":"roweis","year":"2000","journal-title":"Science"},{"key":"ref33","first-page":"1","article-title":"Customisation of paillier homomorphic encryption for efficient binary biometric feature vector matching","author":"penn","year":"2014","journal-title":"Biometrics Special Interest Group (BIOSIG)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2434151"},{"key":"ref31","article-title":"Deep face recognition","author":"parkhi","year":"2015","journal-title":"BMVC"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2097252"},{"key":"ref36","article-title":"Secure iris authentication using visual cryptography","author":"revenkar","year":"2010","journal-title":"arXiv preprint arXiv 1004 1748"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1147\/sj.403.0614"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2008.4766425"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74549-5_97"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2"},{"key":"ref29","first-page":"1","article-title":"Visual cryptography","author":"naor","year":"1994","journal-title":"Workshop on the Theory and Application of of Cryptographic Techniques"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2010.5634527"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1854229.1854270"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298803"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1302","DOI":"10.1109\/TSMCB.2008.927261","article-title":"A new method for generating an invariant iris private key based on the fuzzy vault system","volume":"38","author":"lee","year":"2008","journal-title":"IEEE Transactions on Systems Man and Cybernetics Part B (Cybernetics)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2219653"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.713"},{"key":"ref26","article-title":"Face image reconstruction from deep templates","author":"mai","year":"2017","journal-title":"arXiv preprint arXiv 1703 06870"},{"key":"ref25","article-title":"Surpassing human-level face verification performance on lfw with gaussianface","author":"lu","year":"2015","journal-title":"AAAI"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.87"},{"key":"ref51","article-title":"Learning face representation from scratch","author":"yi","year":"2014","journal-title":"arXiv preprint arXiv 1411 7923"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"ref11","first-page":"144","article-title":"Somewhat practical fully homomorphic encryption","volume":"2012","author":"fan","year":"2012","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref40","author":"shoup","year":"2003","journal-title":"Number theory c++ library (ntl) version 11 0 0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/2007\/13801"},{"key":"ref13","author":"gentry","year":"2009","journal-title":"A Fully Homomorphic Encryption Scheme"},{"key":"ref14","first-page":"129","article-title":"Implementing gentrys fullyhomomorphic encryption scheme","author":"gentry","year":"2011","journal-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref15","first-page":"465","article-title":"Fully homomorphic encryption with polylog overhead","author":"gentry","year":"2012","journal-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref16","author":"goldreich","year":"2009","journal-title":"Foundations of Cryptography Volume 2 Basic Applications"},{"key":"ref17","author":"huang","year":"2007","journal-title":"Labeled Faces in the Wild A Database for Studying Face Recognition in Unconstrained Environments Technical Report"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-6343-z"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.244"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.2438131"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_29"},{"key":"ref5","first-page":"1","article-title":"Packed ciphertexts in lwe-based homomorphic encryption","author":"brakerski","year":"2013","journal-title":"Public-Key Cryptography 2013"},{"key":"ref8","first-page":"143","article-title":"Experiments with random projection","author":"dasgupta","year":"2000","journal-title":"Uncertainty in Artificial Intelligence"},{"key":"ref7","first-page":"484","article-title":"Ghostshell: Secure biometric authentication using integrity-based homomorphic evaluations","volume":"2016","author":"cheon","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2043188"},{"key":"ref9","first-page":"148","article-title":"On enabling secure applications through off-line biometric identification","author":"davida","year":"1998","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2262273"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1126\/science.290.5500.2319"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01793-3_91"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/11527923_32"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1117\/12.304705"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-012-9720-4"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.220"},{"key":"ref43","first-page":"649","article-title":"Biometric encryption","author":"soutar","year":"1999","journal-title":"ICSA Guide to Cryptography"}],"event":{"name":"2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS)","location":"Redondo Beach, CA, USA","start":{"date-parts":[[2018,10,22]]},"end":{"date-parts":[[2018,10,25]]}},"container-title":["2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8692576\/8698537\/08698601.pdf?arnumber=8698601","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T19:09:20Z","timestamp":1557774560000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8698601\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/btas.2018.8698601","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}