2021
DOI: 10.1109/jiot.2021.3050555
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Fuzzy Extractor Based on LPN for Device and Biometric Authentication in IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…Biometric information is the best way to authenticate and verify users [ 16 , 17 , 18 ]. In 2004, Dodis et al [ 19 ] proposed the Fuzzy Extractor to obtain a unique bit string extracted from the biometric template.…”
Section: Preliminariesmentioning
confidence: 99%
“…Biometric information is the best way to authenticate and verify users [ 16 , 17 , 18 ]. In 2004, Dodis et al [ 19 ] proposed the Fuzzy Extractor to obtain a unique bit string extracted from the biometric template.…”
Section: Preliminariesmentioning
confidence: 99%
“…To address the challenges of privacy leakage and data tampering by unauthorised users, the authors of [27] proposed an attribute-based secure access control mechanism that uses federated deep learning (FDL). Moreover, various biometric-based authentication systems have been explored to secure IoT-based healthcare systems [12,28,29].…”
Section: Related Workmentioning
confidence: 99%
“…In the field of public-key cryptography, elliptic-curve cryptography is one method that utilises the algebraic structure of elliptic curves over finite fields. A public essential encryption technique based on the algebraic arrangement of elliptic curves over finite fields can create faster, more minor, or more competent cryptographic keys [12]. (I) Key Mechanism: The sender (signer) is the only one who knows the private key, it is used to make a signature.…”
Section: F Ecc Algorithm Eccmentioning
confidence: 99%