Acknowledgement
본 논문은 2020년도 정부(교육부)의 재원으로 한국연구재단의 지원을 받아 수행된 기초연구사업임 (NRF-2020R1I1A3069008)
References
- Nakamoto. S, "Bitcoin: A Peer-to-Peer Electronic Cash System," 2008.
- Z. Zheng, S. Xie, H. Dai, X. Chen and H. Wang, "An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends," 2017 IEEE International Congress on Big Data (BigData Congress), pp.557-564, 2017.
- K. Christidis and M. Devetsikiotis, "Blockchains and Smart Contracts for the Internet of Things," in IEEE Access, Vol.4, pp.2292-2303, 2016. https://doi.org/10.1109/ACCESS.2016.2566339
- T. M. Fernandez-Carames and P. Fraga-Lamas, "Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks," in IEEE Access, Vol.8, pp.21091-21116, 2020. https://doi.org/10.1109/ACCESS.2020.2968985
- A. Azaria, A. Ekblaw, T. Vieira and A. Lippman, "MedRec: Using Blockchain for Medical Data Access and Permission Management," 2016 2nd International Conference on Open and Big Data (OBD), pp.25-30, 2016.
- U. Uludag, S. Pankanti, S. Prabhakar and A. K. Jain, "Biometric cryptosystems: issues and challenges," in Proceedings of the IEEE, Vol.92, No.6, pp.948-960, 2004. https://doi.org/10.1109/JPROC.2004.827372
- R. Bhupal, K. L. Sanjana, N. K. Khaneja, P. Bhartiya, A. S. Bhat and S. B J, "Finger Vein Authentication System," 2021 International Conference on Computer Communication and Informatics (ICCCI), pp.1-7, 2021.
- S. Pouryayevali, S. Wahabi, S. Hari and D. Hatzinakos, "On establishing evaluation standards for ECG biometrics," 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.3774-3778, 2014.
- Vijay Bhaskar Semwal, Manish Raj, G.C. Nandi, "Biometric gait identification based on a multilayer perceptron," Robotics and Autonomous Systems, Vol.65, pp.65-75, 2015. https://doi.org/10.1016/j.robot.2014.11.010
- A. Mansour, M. Sadik and E. Sabir, "Multi-factor authentication based on multimodal biometrics (MFA-MB) for Cloud Computing," 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA), pp.1-4, 2015.
- Y. C. Tsai, R. Tso, Z. -Y. Liu and K. Chen, "An Improved Non-Interactive Zero-Knowledge Range Proof for Decentralized Applications," 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON), pp.129-134, 2019.
- Yuhan Yang, Lijun Wei, Jing Wu, Chengnian Long, "Block-SMPC: A Blockchain-based Secure Multi-party Computation for Privacy-Protected Data Sharing," In Proceedings of the 2020 The 2nd International Conference on Blockchain Technology (ICBCT'20), Association for Computing Machinery, pp.46-51, 2020.
- FengY, Bai T, Lu S, Tang X, Wu J, "SMPC Task Decomposition: A Theory for Accelerating Secure Multi-party Computation Task," 2023.
- Kristin E. Lauter, "Practical applications of homomorphic encryption," In Proceedings of the 2012 ACM Workshop on Cloud computing security workshop (CCSW '12), Association for Computing Machinery, pp.57-58, 2012.
- Ahmed El-Yahyaoui and Mohamed Dafir EC-Chrif El Kettani, "Fully homomorphic encryption: Searching over encrypted cloud data," In Proceedings of the 2nd international Conference on Big Data, Cloud and Applications (BDCA'17), Association for Computing Machinery, pp.1-5, 2017.
- Zvika Brakerski, Craig Gentry, and Vinod Vaikuntanathan, "(Leveled) Fully Homomorphic Encryption without Bootstrapping," ACM Trans. Comput, 2014.
- Zvika Brakerski, Craig Gentry, and Vinod Vaikuntanathan. "(Leveled) fully homomorphic encryption without bootstrapping," In Proceedings of the 3rd Innovations in Theoretical Computer Science Conference (ITCS '12). Association for Computing Machinery, pp.309-325, 2012.