2015
DOI: 10.1007/978-3-319-28166-7_6
|View full text |Cite
|
Sign up to set email alerts
|

A Signature Scheme with a Fuzzy Private Key

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
43
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 22 publications
(43 citation statements)
references
References 16 publications
0
43
0
Order By: Relevance
“…The rest of the paper is organized as follows: -In Sect. 1.5, we explain the relations between this paper and our earlier papers [19,33]. -In Sect.…”
Section: Paper Organizationmentioning
confidence: 71%
See 2 more Smart Citations
“…The rest of the paper is organized as follows: -In Sect. 1.5, we explain the relations between this paper and our earlier papers [19,33]. -In Sect.…”
Section: Paper Organizationmentioning
confidence: 71%
“…As the information society grows rapidly, the public key infrastructure (PKI) plays a more significant role as an infrastructure for managing digital certificates. It is also expected This is the merged full version of the earlier papers that appeared in the proceedings of ACNS 2015 [33] and the proceedings of ACNS 2016 [19]. 1 Hitachi Ltd., Yokohama, Japan 2 National Institute of Advanced Industrial Science and Technology (AIST), Tokyo, Japan 3 Shizuoka University, Hamamatsu, Japan to be widely used for personal use such as national IDs and e-government services.…”
Section: Background and Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…The concept of fuzzy signature was proposed in [37]. It uses biometric data as private key, such as iris scan and fingerprint, to generate the signature.…”
Section: A Fuzzy Signaturementioning
confidence: 99%
“…Fuzzy signature uses the user's biometric data as a signing key. The concept of fuzzy signature was first proposed by Takahashi et al in [39] and has since been improved by relaxing the requirements for construction or increasing efficiency [40]. However, all the fuzzy signature schemes proposed so far are not robust since the user's biometric data can be directly recovered from the (public) verification key or signature [41].…”
Section: Related Workmentioning
confidence: 99%