Universally Anonymous IBE Based on the Quadratic Residuosity Assumption, CT-RSA'09, pp.32-47, 2009. ,
DOI : 10.1007/3-540-39568-7_5
New constructions of fuzzy identity-based encryption, Proceedings of the 2nd ACM symposium on Information, computer and communications security , ASIACCS '07, pp.368-370, 2007. ,
DOI : 10.1145/1229285.1229330
Generic Constructions of Identity-Based and Certificateless KEMs, Journal of Cryptology, vol.33, issue.2, pp.178-199, 2008. ,
DOI : 10.1007/s00145-007-9000-z
Identity-Based Encryption from the Weil Pairing, SIAM Journal on Computing, vol.32, issue.3, pp.586-615, 2003. ,
DOI : 10.1137/S0097539701398521
Space-Efficient Identity Based Encryption Without Pairings, FOCS'07, pp.647-657, 2007. ,
Secure Remote Authentication Using Biometric Data, EUROCRYPT'05, pp.147-163, 2005. ,
DOI : 10.1007/11426639_9
URL : http://ai.stanford.edu/~xb/eurocrypt05b/fuzzy-full.ps
Optimal Iris Fuzzy Sketches, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems, pp.1-6, 2007. ,
DOI : 10.1109/BTAS.2007.4401904
URL : https://hal.archives-ouvertes.fr/hal-00270547
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication, ACISP'07, pp.96-106, 2007. ,
DOI : 10.1007/978-3-540-73458-1_8
A Biometric Identity Based Signature Scheme, International Journal of Network Security, vol.5, issue.3, pp.317-326, 2007. ,
Multibits biometric string generation based on the likelyhood ratio, BTAS'07, pp.1-6, 2007. ,
Correcting errors without leaking partial information, Proceedings of the thirty-seventh annual ACM symposium on Theory of computing , STOC '05, pp.654-663, 2005. ,
DOI : 10.1145/1060590.1060688
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.120.3846
Secure integration of asymmetric and symmetric encryption schemes, Crypto'99, pp.537-554, 1999. ,
A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low, INDOCRYPT'08, pp.116-129, 2008. ,
DOI : 10.1007/11426639_27
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT, ACISP'06, 2006. ,
DOI : 10.1007/11780656_29
Secure Sketch for Biometric Templates, ASIACRYPT'06, pp.99-113, 2006. ,
DOI : 10.1007/11935230_7
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.85.4275
REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform, CT-RSA'01, pp.159-175, 2001. ,
DOI : 10.1007/3-540-45353-9_13
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.5590
Secure Attribute-Based Systems, ACM CCS'06, pp.99-112, 2006. ,
DOI : 10.3233/jcs-2009-0383
URL : http://doi.org/10.3233/jcs-2009-0383
Fuzzy Identity-Based Encryption, EUROCRYPT'05, pp.457-473, 2005. ,
DOI : 10.1007/11426639_27
A New Biometric Identity Based Encryption Scheme, 2008 The 9th International Conference for Young Computer Scientists, pp.2061-2066, 2008. ,
DOI : 10.1109/ICYCS.2008.420
Biometric Identity Based Signature Revisited, EuroPKI'09, 2009. ,
DOI : 10.1007/978-3-642-16441-5_18
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems, AFRICACRYPT'09, pp.198-216, 2009. ,
DOI : 10.1007/11426639_7
A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes, ISPEC'08, pp.56-70, 2008. ,
DOI : 10.1007/978-3-540-79104-1_5
URL : https://hal.archives-ouvertes.fr/inria-00419156
Anonymous and Fuzzy Identity-Based Encryption. Master's thesis, 2007. ,
Fuzzy Identity Based Signature, Cryptology ePrint Archive Report, vol.002, 2008. ,