{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:44:25Z","timestamp":1761648265314,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/wifs.2014.7084304","type":"proceedings-article","created":{"date-parts":[[2015,4,22]],"date-time":"2015-04-22T20:32:15Z","timestamp":1429734735000},"page":"60-65","source":"Crossref","is-referenced-by-count":19,"title":["Security aspects of privacy-preserving biometric authentication based on ideal lattices and ring-LWE"],"prefix":"10.1109","author":[{"given":"Aysajan","family":"Abidin","sequence":"first","affiliation":[]},{"given":"Aikaterini","family":"Mitrokotsa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"165","article-title":"On data banks and privacy homomorphisms","author":"rivest","year":"1978","journal-title":"Foundations of Secure Computation"},{"key":"ref11","article-title":"How to exchange secrets with oblivious transfer","author":"rabin","year":"1981","journal-title":"Technical Report TR-81 Harvard Aiken Computation Laboratory"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3812.3818"},{"key":"ref13","first-page":"55","article-title":"Packed homomorphic encryption based on ideal lattices and its application to biometrics","volume":"8128","author":"yasuda","year":"2013","journal-title":"Security Engineering and Intelligence Inf ser LNCS"},{"key":"ref14","first-page":"34","article-title":"Practical packing method in somewhat homomorphic encryption","volume":"8147","year":"2013","journal-title":"DPM\/SETOP ser LNCS"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref16","first-page":"129","article-title":"Implementing gentry's fully-homomorphic encryption scheme","volume":"6632","author":"gentry","year":"2011","journal-title":"EUROCRYPT Ser LNCS"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2184092"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293350"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71677-8_26"},{"key":"ref4","first-page":"76670c-12","article-title":"Cryptographically secure biometrics","year":"2010","journal-title":"Proc SPIE 7667 Biometric Technology for Human Identification VIT"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIC-STH.2009.5444478"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1854229.1854270"},{"key":"ref5","first-page":"21","article-title":"Secure biometric authentication with improved accuracy","volume":"5107","author":"barbosa","year":"2008","journal-title":"ACISP Ser LNCS"},{"key":"ref8","first-page":"235","article-title":"Privacy-preserving face recognition","author":"erkin","year":"2009","journal-title":"PETS"},{"key":"ref7","article-title":"Efficient privacy-preserving biometric identification","author":"huang","year":"2011","journal-title":"NDSS"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73458-1_8"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2007.4401904"},{"key":"ref9","first-page":"229","article-title":"Efficient privacy-preserving face recognition","author":"sadeghi","year":"2009","journal-title":"Proceedings of ICISC Ser LNCS"},{"key":"ref20","first-page":"111","article-title":"Verifiable delegation of computation over large datasets","volume":"6841","author":"benabbas","year":"2011","journal-title":"CRYPTO Ser LNCS"},{"key":"ref22","first-page":"465","article-title":"Non-interactive verifiable computing: Outsourcing computation to untrusted workers","author":"gennaro","year":"2010","journal-title":"CRYPTO Ser LNCS"},{"key":"ref21","first-page":"483","article-title":"Improved delegation of computation using fully homomorphic encryption","author":"chung","year":"2010","journal-title":"CRYPTO Ser LNCS"},{"key":"ref24","first-page":"222","article-title":"Signatures of correct computation","author":"papamanthou","year":"2013","journal-title":"TCC'06 Ser LNCS"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566844"}],"event":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2014,12,3]]},"location":"Atlanta, GA","end":{"date-parts":[[2014,12,5]]}},"container-title":["2014 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7070475\/7084286\/07084304.pdf?arnumber=7084304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T18:56:13Z","timestamp":1490381773000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7084304\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/wifs.2014.7084304","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}