Acceleration of Inner-Pairing Product Operation for Secure Biometric Verification

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Verification of secure biometric authentication protocols

The thesis presents verification of biometric authentication protocols. ProVerif is used as the verification tool for verifying and analysing the protocols. The protocol are analysed in ProVerif model. Various attacks to the protocols are generated in order to verify whether the protocols hold their intended properties. We have selected three biometric authentication protocols and proposed a re...

متن کامل

Secure Computation for Biometric Data Security - Application to Speaker Verification

The goal of this research is to develop provable secure computation techniques for two biometric security tasks in complex distributed systems involving multiple parties; namely biometric data retrieval and authentication. We first present models for privacy and security that delineate the conditions under which biometric data disclosure are allowed. We then discuss the secure computation techn...

متن کامل

assessment of human random number generation for biometric verification

random number generation is one of the human abilities. it is proven that the sequence of random numbers generated by people do not follow full randomness criteria. these numbers produced by brain activity seem to be completely non stationary. in this paper, we show that there is a distinction between the random numbers generated by different people who provides the discrimination capability, a...

متن کامل

$C^{*}$-semi-inner product spaces

In this paper, we introduce a generalization of Hilbert $C^*$-modules which are pre-Finsler modules, namely, $C^{*}$-semi-inner product spaces. Some properties and results of such spaces are investigated, specially the orthogonality in these spaces will be considered. We then study bounded linear operators on $C^{*}$-semi-inner product spaces.

متن کامل

Secure Sketch for Biometric Templates

There have been active discussions on how to derive a consistent cryptographic key from noisy data such as biometric templates, with the help of some extra information called a sketch. It is desirable that the sketch reveals little information about the biometric templates even in the worst case (i.e., the entropy loss should be low). The main difficulty is that many biometric templates are rep...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Sensors

سال: 2021

ISSN: 1424-8220

DOI: 10.3390/s21082859