• Publications
  • Influence
HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks
TLDR
We show how a modification of the Hopper and Blum (HB) authentication protocol thwarts Gilbert, Robshaw and Sibert's attack. Expand
  • 256
  • 18
Privacy-Preserving Classification on Deep Neural Network
TLDR
Neural Networks (NN) are today increasingly used in Machine Learning where they have become deeper and deeper to accurately model or classify high-level abstractions of data. Expand
  • 121
  • 17
  • PDF
Public Traceability in Traitor Tracing Schemes
TLDR
Traitor tracing schemes are of major importance for secure distribution of digital content. Expand
  • 108
  • 16
  • PDF
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
TLDR
This work deals with the security challenges in authentication protocols employing volatile biometric features, where the authentication is indeed a comparison between a fresh biometric template and that enrolled during enrollment phase. Expand
  • 129
  • 12
  • PDF
Theoretical and Practical Boundaries of Binary Secure Sketches
TLDR
We propose a method that models discrepancies between biometric measurements as an erasure and error channel, and we estimate its capacity. Expand
  • 100
  • 9
White Box Cryptography: Another Attempt
TLDR
We show how to conceal the alge- braic structure of a \traceable block cipher" by adding perturbations to its description. Expand
  • 76
  • 9
  • PDF
Optimal Iris Fuzzy Sketches
TLDR
Fuzzy sketches, introduced as a link between biometry and cryptography, are a way of handling biometric data matching as an error correction issue. Expand
  • 126
  • 7
  • PDF
An Authentication Protocol with Encrypted Biometric Data
TLDR
We show how to replace the basic PIR scheme they used with Lipmaa's which has ones of the best known communication complexity. Expand
  • 69
  • 7
GSHADE: faster privacy-preserving distance computation and biometric identification
TLDR
We introduce a generalization of the SHADE protocol, called GSHADE, that enables privacy-preserving computation of several distance metrics, including (normalized) Hamming distance, Euclidean distance, Mahalanobis distance, and scalar product. Expand
  • 62
  • 7
  • PDF
Extended Private Information Retrieval and Its Application in Biometrics Authentications
TLDR
This paper describes a new primitive, Extended Private Information Retrieval (EPIR) which is a natural generalization of PIR, and two EPIR protocols, one for testing equality and the other for computing Hamming distance. Expand
  • 50
  • 5
  • PDF