High-Secure Fingerprint Authentication System Using Ring-LWE Cryptography
نویسندگان
چکیده
منابع مشابه
Ring-LWE Cryptography for the Number Theorist
In this paper, we survey the status of attacks on the ring and polynomial learning with errors problems (RLWE and PLWE). Recent work on the security of these problems [EHL, ELOS] gives rise to interesting questions about number fields. We extend these attacks and survey related open problems in number theory, including spectral distortion of an algebraic number and its relationship to Mahler me...
متن کاملA Toolkit for Ring-LWE Cryptography
Recent advances in lattice cryptography, mainly stemming from the development of ring-based primitives such as ring-LWE, have made it possible to design cryptographic schemes whose efficiency is competitive with that of more traditional number-theoretic ones, along with entirely new applications like fully homomorphic encryption. Unfortunately, realizing the full potential of ring-based cryptog...
متن کاملSecure Iris Authentication Using Visual Cryptography
Biometrics deal with automated methods of identifying a person or verifying the identity of a person based on physiological or behavioral characteristics. Visual cryptography is a secret sharing scheme where a secret image is encrypted into the shares which independently disclose no information about the original secret image. As biometric template are stored in the centralized database, due to...
متن کاملHigh Secure Fingerprint Authentication in Ad hoc Network
In this paper, the methodology proposed is an novel robust approach on secure fingerprint authentication and matching techniques to implement in ad-hoc wireless networks. This is a difficult problem in ad-hoc network, as it involves bootstrapping trust between the devices. This journal would present a solution, which provides fingerprint authentication techniques to share their communication in...
متن کاملA secure and private fingerprint-based authentication system
In this paper we propose a secure and private fingerprint-based authentication system. First the user of the system ought to register his or her fingerprints to a server database of fingerprint-minutiae templates, which are generated from the original fingerprint images and then are inserted with a number of foreign minutiae. Upon authentication the same live fingerprint will be measured again ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2019
ISSN: 2169-3536
DOI: 10.1109/access.2019.2899359