{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T14:17:31Z","timestamp":1772893051591,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484586","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:27Z","timestamp":1636805127000},"page":"2046-2065","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Revisiting Fuzzy Signatures: Towards a More Risk-Free Cryptographic Authentication System based on Biometrics"],"prefix":"10.1145","author":[{"given":"Shuichi","family":"Katsumata","sequence":"first","affiliation":[{"name":"AIST, Tokyo, Japan"}]},{"given":"Takahiro","family":"Matsuda","sequence":"additional","affiliation":[{"name":"AIST, Tokyo, Japan"}]},{"given":"Wataru","family":"Nakamura","sequence":"additional","affiliation":[{"name":"Hitachi, Ltd., Tokyo, Japan"}]},{"given":"Kazuma","family":"Ohara","sequence":"additional","affiliation":[{"name":"AIST, Tokyo, Japan"}]},{"given":"Kenta","family":"Takahashi","sequence":"additional","affiliation":[{"name":"Hitachi, Ltd., Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180453"},{"key":"e_1_3_2_2_2_1","volume-title":"Pattern recognition and machine learning","author":"Bishop Christopher M","unstructured":"Christopher M Bishop. 2006. Pattern recognition and machine learning. Springer."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--642--14623--7_28"},{"key":"e_1_3_2_2_4_1","volume-title":"An introduction to statistical modeling of extreme values","author":"Coles Stuart","unstructured":"Stuart Coles, Joanna Bawa, Lesley Trenner, and Pat Dorazio. 2001. An introduction to statistical modeling of extreme values. Vol. 208. Springer."},{"key":"e_1_3_2_2_5_1","volume-title":"The importance of being random: statistical principles of iris recognition. Pattern recognition","author":"Daugman John","year":"2003","unstructured":"John Daugman. 2003. The importance of being random: statistical principles of iris recognition. Pattern recognition, Vol. 36, 2 (2003), 279--291."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818350"},{"key":"e_1_3_2_2_7_1","series-title":"SIAM journal on computing","volume-title":"Fuzzy extractors: How to generate strong keys from biometrics and other noisy data","author":"Dodis Yevgeniy","year":"2008","unstructured":"Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, and Adam Smith. 2008. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM journal on computing, Vol. 38, 1 (2008), 97--139."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--642--36594--2_1"},{"key":"e_1_3_2_2_10_1","unstructured":"Vidhi Doshi. 2018. A security breach in India has left a billion people at risk of identity theft. https:\/\/www.washingtonpost.com\/news\/worldviews\/wp\/2018\/01\/04\/a-security-breach-in-india-has-left-a-billion-people-at-risk-of-identity-theft\/. Accessed: 2020--12--22."},{"key":"e_1_3_2_2_11_1","unstructured":"The European Union Agency for Cybersecurity. 2020. ENISA Threat Landscape 2020 - Data Breach. https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2020-data-breach. Accessed: 2020--12--22."},{"key":"e_1_3_2_2_12_1","volume-title":"Nonparametric Statistical Inference: Revised and Expanded","author":"Gibbons Jean Dickinson","unstructured":"Jean Dickinson Gibbons and Subhabrata Chakraborti. 2014. Nonparametric Statistical Inference: Revised and Expanded .CRC press."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1001\/jama.1983.03330370053031"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539793244708"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72359-4_55"},{"key":"e_1_3_2_2_16_1","unstructured":"Takashi Kawakami and Yusuke Hinata. 2019. Pay with your face: 100m Chinese switch from smartphones. https:\/\/asia.nikkei.com\/Business\/China-tech\/Pay-with-your-face-100m-Chinese-switch-from-smartphones. Accessed: 2020--1--14."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2011.2171697"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--39555--5_6"},{"key":"e_1_3_2_2_19_1","unstructured":"Naoto Miura Akio Nagasaka and Takafumi Miyatake. 2002. Automatic Feature Extraction from non-uniform Finger Vein Image and its Application to Personal Identification.. In MVA. Citeseer 253--256."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E99.A.929"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2009.5339059"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01793-3_76"},{"key":"e_1_3_2_2_23_1","unstructured":"United Nations. 2020. Report of the Secretary-General Roadmap for Digital Cooperation. https:\/\/www.un.org\/en\/content\/digital-cooperation-roadmap\/assets\/pdf\/Roadmap_for_Digital_Cooperation_EN.pdf."},{"key":"e_1_3_2_2_24_1","unstructured":"Government of India. 2019. What is Aadhar. https:\/\/uidai.gov.in\/my-aadhaar\/about-your-aadhaar.html. Accessed: 2021--1-18."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010003"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/0--387--34805-0_22"},{"key":"e_1_3_2_2_27_1","unstructured":"Michael Schuckers. 2012. Scaling of Biometric False Match Rates Using Extreme Value Theory. (2012). https:\/\/www.nist.gov\/system\/files\/documents\/2016\/11\/30\/345_schuckers_ibpc.pdf International Biometrics Performance Conference (NIST)."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/3--540--69053-0_18"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--28166--7_6"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-019-00428-z"},{"key":"e_1_3_2_2_31_1","volume-title":"Robust biometric score fusion by naive likelihood ratio via receiver operating characteristics","author":"Tao Qian","year":"2012","unstructured":"Qian Tao and Raymond Veldhuis. 2012. Robust biometric score fusion by naive likelihood ratio via receiver operating characteristics. IEEE transactions on information forensics and security, Vol. 8, 2 (2012), 305--313."},{"key":"e_1_3_2_2_32_1","unstructured":"VISA. 2017. Goodbye passwords. Hello biometrics. https:\/\/usa.visa.com\/dam\/VCOM\/global\/visa-everywhere\/documents\/visa-biometrics-payments-study.pdf. Accessed: 2021--1-14."},{"key":"e_1_3_2_2_33_1","volume-title":"Diversity of human finger vein patterns and its application to personal identification. Bulletin of informatics and cybernetics","author":"Yanagawa Takashio","year":"2009","unstructured":"Takashio Yanagawa, Satoshi Aoki, and Tetsuji Oyama. 2009. Diversity of human finger vein patterns and its application to personal identification. Bulletin of informatics and cybernetics, Vol. 41 (2009), 1--9."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/2074627.2074667"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484586","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484586","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:44:43Z","timestamp":1763498683000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484586"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":34,"alternative-id":["10.1145\/3460120.3484586","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484586","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}