참고문헌
- R. Belguechi, V. Alimi, E. Cherrier, P. Lacharme, and C. Rosenberger, "An overview on privacy preserving biometrics" in Recent Application in Biometrics. Rijeka, Croatia: InTech, 2011, p. 65-84.
- N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Systems Journal, vol. 40, no. 3, pp. 614-634, 2001. https://doi.org/10.1147/sj.403.0614
- A. Juels and M. Sudan, "A fuzzy vault scheme," Designs, Codes and Cryptography, vol. 38, no. 2, pp. 237-257, 2006. https://doi.org/10.1007/s10623-005-6343-z
- A. Juels and M. Wattenberg, "A fuzzy commitment scheme," in Proceedings of the 6th ACM Conference on Computer and Communications Security, Singapore, 1999, pp. 28-36.
- M. Blanton and P. Gasti, "Secure and efficient protocols for iris and fingerprint identification," in European Symposium on Research in Computer Security. Heidelberg: Springer, 2011, pp. 190-209.
- I. Damgard, M. Geisler, and M. Kroigard, "Homomorphic encryption and secure comparison," International Journal of Applied Cryptography, vol. 1, no. 1, pp. 22-31, 2008. https://doi.org/10.1504/IJACT.2008.017048
- R. Kulkarni and A. Namboodiri, "Secure hamming distance based biometric authentication," in Proceedings of 2013 International Conference on Biometrics (ICB), Madrid, Spain, 2013, pp. 1-6.
- C. Gentry, "Fully homomorphic encryption using ideal lattices," in Proceedings of the 41st Annual ACM Symposium on Theory of Computing, Bethesda, MD, 2009, pp. 169-178.
- C. Karabat, M. S. Kiraz, H. Erdogan, and E. Savas, "THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system," EURASIP Journal on Advances in Signal Processing, vol. 2015, article no. 71, 2015.
- M. J. Dworkin, "SHA-3 Standard: permutation-based hash and extendable-output functions (NIST FIPS-202)," National Institute of Standards and Technology, Gaithersburg, MD, 2015.
- J. H. Cheon, H. Chung, M. Kim, and K. W. Lee, "Ghostshell: secure biometric authentication using Integrity-based homomorphic evaluations," IACR Cryptology ePrint Archive, vol. 2016, article no. 484, 2016.
- J. Fan and F. Vercauteren, "Somewhat practical fully homomorphic encryption," IACR Cryptology ePrint Archive, vol. 2012, article no. 144, 2012.
- H. Chen, K. Laine, and R. Player, "Simple encrypted arithmetic library-SEAL v2.1," in Financial Cryptography and Data Security. Cham: Springer, 2017, pp. 3-18
- Z. Brakerski, C. Gentry, and S. Halevi, "Packed ciphertexts in LWE-based homomorphic encryption," in Public Key Cryptography - PKC 2013. Heidelberg: Springer, 2013, pp. 1-13.
- N. P. Smart and F. Vercauteren, "Fully homomorphic SIMD operations," Designs, Codes and Cryptography, vol. 71, no. 1, pp. 57-81, 2014. https://doi.org/10.1007/s10623-012-9720-4
- J. Deng, C. Xu, and H. Yang, "A secure computation scheme of inner product based on fully homomorphic encryption," Journal of University of Electronic Science and Technology of China, vol. 45, no. 5, pp. 808-811, 2016.
- S. Thavalengal, P. Bigioi, and P. Corcoran, "Iris authentication in handheld devices-considerations for constraint-free acquisition," IEEE Transactions on Consumer Electronics, vol. 61, no. 2, pp. 245-253, 2015. https://doi.org/10.1109/TCE.2015.7150600
- CASIA iris database [Online]. Available: http://biometrics.idealtest.org.
- L. Masek and P. Kovesi, "MATLAB source code for a biometric identification system based on iris patterns," School of Computer Science and Software Engineering, University of Western Australia, 2003.
- Q. Tian and Z. Liu. "Survey of iris recognition," Application Research of Computers, vol. 25, no. 5, pp. 1295-1300, 2008. https://doi.org/10.3969/j.issn.1001-3695.2008.05.005
- M. R. Albrecht, "On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL," in Advanced in Cryptology - EUROCRYPT 2017. Cham: Springer, 2017, pp. 103-129.