• Publications
  • Influence
HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks
TLDR
We show how a modification of the Hopper and Blum (HB) authentication protocol thwarts Gilbert, Robshaw and Sibert's attack. Expand
  • 256
  • 18
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
TLDR
This work deals with the security challenges in authentication protocols employing volatile biometric features, where the authentication is indeed a comparison between a fresh biometric template and that enrolled during enrollment phase. Expand
  • 129
  • 12
  • PDF
Theoretical and Practical Boundaries of Binary Secure Sketches
TLDR
We propose a method that models discrepancies between biometric measurements as an erasure and error channel, and we estimate its capacity. Expand
  • 100
  • 9
White Box Cryptography: Another Attempt
TLDR
We show how to conceal the alge- braic structure of a \traceable block cipher" by adding perturbations to its description. Expand
  • 75
  • 9
  • PDF
Binary feature vector fingerprint representation from minutiae vicinities
TLDR
We propose a new method to transform a minutiae set into a quantized feature vector by local comparisons. Expand
  • 77
  • 8
Optimal Iris Fuzzy Sketches
TLDR
Fuzzy sketches, introduced as a link between biometry and cryptography, are a way of handling biometric data matching as an error correction issue. Expand
  • 126
  • 7
  • PDF
An Authentication Protocol with Encrypted Biometric Data
TLDR
We show how to replace the basic PIR scheme they used with Lipmaa's which has ones of the best known communication complexity. Expand
  • 69
  • 7
GSHADE: faster privacy-preserving distance computation and biometric identification
TLDR
We introduce a generalization of the SHADE protocol, called GSHADE, that enables privacy-preserving computation of several distance metrics, including (normalized) Hamming distance, Euclidean distance, Mahalanobis distance, and scalar product. Expand
  • 62
  • 7
  • PDF
Extended Private Information Retrieval and Its Application in Biometrics Authentications
TLDR
This paper describes a new primitive, Extended Private Information Retrieval (EPIR) which is a natural generalization of PIR, and two EPIR protocols, one for testing equality and the other for computing Hamming distance. Expand
  • 50
  • 5
  • PDF
Cryptanalysis of EC-RAC, a RFID Identification Protocol
TLDR
At RFID'08, Lee et al. have proposed a RFID scheme based on elliptic curve cryptography. Expand
  • 94
  • 4