Secure biometric hashing against relation-based attacks via maximizing min-entropy.
Lianyi YuQiangjiang WangYan WoGuoqiang HanPublished in: Comput. Secur. (2022)
Keyphrases
- stream cipher
- user authentication
- cryptographic algorithms
- security mechanisms
- biometric data
- secure routing
- security protocols
- cryptographic protocols
- hash functions
- remote user authentication scheme
- chosen plaintext
- security measures
- security level
- countermeasures
- information theory
- security flaws
- security issues
- block cipher
- mutual information
- authentication scheme
- pattern recognition
- biometric template
- file organization
- advanced encryption standard
- key management
- unauthorized access
- data structure
- hamming distance
- biometric authentication
- watermarking algorithm
- personal identification
- sensitive data
- order preserving
- biometric identification
- identity verification
- gray code
- security threats
- hash table
- biometric systems
- security systems
- standard model
- security requirements
- resource constrained