{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:53:33Z","timestamp":1729619613289,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/desec.2017.8073861","type":"proceedings-article","created":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T15:22:28Z","timestamp":1508944948000},"page":"424-428","source":"Crossref","is-referenced-by-count":1,"title":["A novel public key encryption model based on transformed biometrics"],"prefix":"10.1109","author":[{"given":"Bin","family":"Yan","sequence":"first","affiliation":[]},{"given":"Lin","family":"You","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_9"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_13"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13013-7_23"},{"key":"ref13","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes [J]","volume":"21","author":"shamir","year":"1984","journal-title":"Lecture Notes in Computer Science"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1007\/11426639_27","article-title":"Fuzzy Identity-Based Encryption [C]","author":"sahait","year":"2005","journal-title":"Advances in Cryptology - EUROCRYPT 2005"},{"key":"ref15","first-page":"157170","article-title":"More efficient fingerprint biometric encryption [J]","volume":"3","author":"gao","year":"2016","journal-title":"Journalof Cryptologic Research"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2489179"},{"key":"ref4","first-page":"213","article-title":"Identity based encryption from the Weil pairing [J]","volume":"32","author":"boneh","year":"2015","journal-title":"SIAM Journal on Computing"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_14"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1007\/11761679_27","article-title":"Practical Identity-Based Encryption Without Random Oracles [J]","volume":"4004","author":"gentry","year":"2006","journal-title":"Lecture Notes in Computer Science"},{"key":"ref5","first-page":"360","article-title":"An Identity Based Encryption Scheme Based on Quadratic Residues [J]","volume":"2260","author":"cocks","year":"0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref2","first-page":"253","article-title":"Functional Encryption: Definitions and Challenges [J]","volume":"2010","author":"dan","year":"2010","journal-title":"Lecture Notes in Computer Science"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/449038a"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36095-4_4"}],"event":{"name":"2017 IEEE Conference on Dependable and Secure Computing","start":{"date-parts":[[2017,8,7]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2017,8,10]]}},"container-title":["2017 IEEE Conference on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8053489\/8073795\/08073861.pdf?arnumber=8073861","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T00:37:22Z","timestamp":1570235842000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8073861\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/desec.2017.8073861","relation":{},"subject":[],"published":{"date-parts":[[2017,8]]}}}