{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:47:10Z","timestamp":1767340030816,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,9,9]],"date-time":"2010-09-09T00:00:00Z","timestamp":1283990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,9,9]]},"DOI":"10.1145\/1854229.1854270","type":"proceedings-article","created":{"date-parts":[[2010,9,14]],"date-time":"2010-09-14T14:53:20Z","timestamp":1284476000000},"page":"231-240","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":127,"title":["Privacy-preserving fingercode authentication"],"prefix":"10.1145","author":[{"given":"Mauro","family":"Barni","sequence":"first","affiliation":[{"name":"Universit\u00e0 di Siena, Siena, Italy"}]},{"given":"Tiziano","family":"Bianchi","sequence":"additional","affiliation":[{"name":"Universit\u00e0 di Firenze, Firenze, Italy"}]},{"given":"Dario","family":"Catalano","sequence":"additional","affiliation":[{"name":"Universit\u00e0 di Catania, Catania, Italy"}]},{"given":"Mario","family":"Di Raimondo","sequence":"additional","affiliation":[{"name":"Universit\u00e0 di Catania, Catania, Italy"}]},{"given":"Ruggero","family":"Donida Labati","sequence":"additional","affiliation":[{"name":"Universit\u00e0 di Milano, Milano, Italy"}]},{"given":"Pierluigi","family":"Failla","sequence":"additional","affiliation":[{"name":"Universit\u00e0 di Siena, Siena, Italy"}]},{"given":"Dario","family":"Fiore","sequence":"additional","affiliation":[{"name":"\u00c9cole normale sup\u00e9rieure, Paris, France"}]},{"given":"Riccardo","family":"Lazzeretti","sequence":"additional","affiliation":[{"name":"Universit\u00e0 di Siena, Siena, Italy"}]},{"given":"Vincenzo","family":"Piuri","sequence":"additional","affiliation":[{"name":"Universit\u00e0 di Milano, Milano, Italy"}]},{"given":"Fabio","family":"Scotti","sequence":"additional","affiliation":[{"name":"Universit\u00e0 di Milano, Milano, Italy"}]},{"given":"Alessandro","family":"Piva","sequence":"additional","affiliation":[{"name":"Universit\u00e0 di Firenze, Firenze, Italy"}]}],"member":"320","published-online":{"date-parts":[[2010,9,9]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"253","volume-title":"Efficient privacy-preserving face recognition,\" in ICISC '09: Proceedings of the 12th Annual International Conference on Information Security and Cryptology, ser. LNCS","author":"Sadeghi A.","year":"2009","unstructured":"A. Sadeghi , T. Schneider , and I. Wehrenberg , \" Efficient privacy-preserving face recognition,\" in ICISC '09: Proceedings of the 12th Annual International Conference on Information Security and Cryptology, ser. LNCS , vol. 5984 . Springer-Verlag , December 2--4, 2009 , pp. 235{ 253 , full version available at http:\/\/eprint.iacr.org\/2009\/507. A. Sadeghi, T. Schneider, and I. Wehrenberg, \"Efficient privacy-preserving face recognition,\" in ICISC '09: Proceedings of the 12th Annual International Conference on Information Security and Cryptology, ser. LNCS, vol. 5984. Springer-Verlag, December 2--4, 2009, pp. 235{253, full version available at http:\/\/eprint.iacr.org\/2009\/507."},{"key":"e_1_3_2_1_2_1","volume-title":"Biometrics: Personal Identification in Networked Society","author":"Bolle R.","year":"1998","unstructured":"R. Bolle and S. Pankanti , Biometrics: Personal Identification in Networked Society , A. K. Jain, Ed. Norwell, MA, USA : Kluwer Academic Publishers , 1998 . R. Bolle and S. Pankanti, Biometrics: Personal Identification in Networked Society, A. K. Jain, Ed. Norwell, MA, USA: Kluwer Academic Publishers, 1998."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_14"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.841531"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1557624"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.628674"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(99)00052-7"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1049\/el:19990213"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11915034_70"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.761265"},{"key":"e_1_3_2_1_11_1","first-page":"586","volume-title":"Proceedings CVPR '91., IEEE Computer Society Conference on","author":"Turk M.","year":"1991","unstructured":"M. Turk and A. Pentland , \" Face recognition using eigenfaces,\" in Computer Vision and Pattern Recognition, 1991 . Proceedings CVPR '91., IEEE Computer Society Conference on , 1991 , pp. 586 -- 591 . M. Turk and A. Pentland, \"Face recognition using eigenfaces,\" in Computer Vision and Pattern Recognition, 1991. Proceedings CVPR '91., IEEE Computer Society Conference on, 1991, pp. 586--591."},{"key":"e_1_3_2_1_12_1","first-page":"57","article-title":"Nist recommendation for key management,\" ser","volume":"800","year":"2005","unstructured":"\" Nist recommendation for key management,\" ser . NIST Special Publication , vol. 800 -- 57 , August 2005 . \"Nist recommendation for key management,\" ser. NIST Special Publication, vol. 800--57, August 2005.","journal-title":"NIST Special Publication"},{"key":"e_1_3_2_1_13_1","first-page":"223","volume-title":"ser. LNCS","author":"Paillier P.","year":"1999","unstructured":"P. Paillier , \"Public-key cryptosystems based on composite degree residuosity classes,\" in EUROCRYPT'99 , ser. LNCS , J. Stern, Ed., vol. 1592 . Springer-Verlag , Berlin, Germany , May 1999 , pp. 223 -- 238 . P. Paillier, \"Public-key cryptosystems based on composite degree residuosity classes,\" in EUROCRYPT'99, ser. LNCS, J. Stern, Ed., vol. 1592. Springer-Verlag, Berlin, Germany, May 1999, pp. 223--238."},{"key":"e_1_3_2_1_14_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"416","DOI":"10.1007\/978-3-540-73458-1_30","volume-title":"Efficient and secure comparison for on-line auctions,\" in ACISP","author":"Damg\u00e5rd I.","year":"2007","unstructured":"I. Damg\u00e5rd , M. Geisler , and M. Kr\u00f8igard , \" Efficient and secure comparison for on-line auctions,\" in ACISP , ser. Lecture Notes in Computer Science , J. Pieprzyk, H. Ghodosi, and E. Dawson, Eds., vol. 4586 . Springer , 2007 , pp. 416 -- 430 . I. Damg\u00e5rd, M. Geisler, and M. Kr\u00f8igard, \"Efficient and secure comparison for on-line auctions,\" in ACISP, ser. Lecture Notes in Computer Science, J. Pieprzyk, H. Ghodosi, and E. Dawson, Eds., vol. 4586. Springer, 2007, pp. 416--430."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1985.2"},{"key":"e_1_3_2_1_16_1","first-page":"10","volume-title":"ser. LNCS","author":"ElGamal T.","year":"1985","unstructured":"T. ElGamal , \" A public key cryptosystem and a signature scheme based on discrete logarithms,\" in CRYPTO'84 , ser. LNCS , G. R. Blakley and D. Chaum, Eds., vol. 196 . Springer-Verlag , Berlin, Germany , Aug. 1985 , pp. 10 -- 18 . T. ElGamal, \"A public key cryptosystem and a signature scheme based on discrete logarithms,\" in CRYPTO'84, ser. LNCS, G. R. Blakley and D. Chaum, Eds., vol. 196. Springer-Verlag, Berlin, Germany, Aug. 1985, pp. 10--18."},{"volume-title":"Certicom Research","year":"2000","key":"e_1_3_2_1_17_1","unstructured":"\"Standard for efficient cryptography, SEC1: Elliptic curves cryptography,\" Technical report , Certicom Research , 2000 , available at http:\/\/www.secg.org. \"Standard for efficient cryptography, SEC1: Elliptic curves cryptography,\" Technical report, Certicom Research, 2000, available at http:\/\/www.secg.org."},{"volume-title":"Certicom Research","year":"2000","key":"e_1_3_2_1_18_1","unstructured":"\"Standard for efficient cryptography, SEC2: Recommended elliptic curves domain parameters,\" Technical report , Certicom Research , 2000 , available at http:\/\/www.secg.org. \"Standard for efficient cryptography, SEC2: Recommended elliptic curves domain parameters,\" Technical report, Certicom Research, 2000, available at http:\/\/www.secg.org."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70583-3_40"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_15"},{"key":"e_1_3_2_1_21_1","first-page":"20","volume-title":"Fairplay|a secure two-party computation system,\" in SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium","author":"Malkhi D.","year":"2004","unstructured":"D. Malkhi , N. Nisan , B. Pinkas , and Y. Sella , \" Fairplay|a secure two-party computation system,\" in SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium . Berkeley, CA, USA : USENIX Association , 2004 , pp. 20 -- 20 . D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella, \"Fairplay|a secure two-party computation system,\" in SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2004, pp. 20--20."},{"key":"e_1_3_2_1_22_1","first-page":"448","volume-title":"Efficient oblivious transfer protocols,\" in SODA '01: Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms","author":"Naor M.","year":"2001","unstructured":"M. Naor and B. Pinkas , \" Efficient oblivious transfer protocols,\" in SODA '01: Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms . Philadelphia, PA, USA : Society for Industrial and Applied Mathematics , 2001 , pp. 448 -- 457 . M. Naor and B. Pinkas, \"Efficient oblivious transfer protocols,\" in SODA '01: Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms. Philadelphia, PA, USA: Society for Industrial and Applied Mathematics, 2001, pp. 448--457."}],"event":{"name":"MM&Sec '10: Multimedia and Security Workshop","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Roma Italy","acronym":"MM&Sec '10"},"container-title":["Proceedings of the 12th ACM workshop on Multimedia and security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1854229.1854270","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1854229.1854270","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:22:42Z","timestamp":1750245762000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1854229.1854270"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9,9]]},"references-count":22,"alternative-id":["10.1145\/1854229.1854270","10.1145\/1854229"],"URL":"https:\/\/doi.org\/10.1145\/1854229.1854270","relation":{},"subject":[],"published":{"date-parts":[[2010,9,9]]},"assertion":[{"value":"2010-09-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}