T. Antignac and D. L. Métayer, Privacy Architectures: Reasoning about Data Minimisation and Integrity, Security and Trust Management ? STM'14, pp.17-32, 2014.
DOI : 10.1007/978-3-319-11851-2_2

URL : https://hal.archives-ouvertes.fr/hal-01054758

D. Boneh and H. Shacham, Group signatures with verifier-local revocation, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.168-177, 2004.
DOI : 10.1145/1030083.1030106

URL : http://hovav.net/dist/preteripsistic.ps

J. Bringer, H. Chabanne, D. L. Métayer, and R. Lescuyer, Privacy by Design in Practice: Reasoning about Privacy Properties of Biometric System Architectures, Formal Methods ? FM'15, pp.90-107, 2015.
DOI : 10.1007/978-3-319-19249-9_7

URL : https://hal.archives-ouvertes.fr/hal-01247110

J. Bringer, H. Chabanne, D. Pointcheval, and S. Zimmer, An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication, International Workshop on Security ? IWSEC'08, pp.219-230, 2008.
DOI : 10.1007/978-3-540-25976-3_15

URL : https://hal.archives-ouvertes.fr/inria-00419151

S. Canard and M. Girault, Implementing group signature schemes with smart cards, Smart Card Research and Advanced Application ? CARDIS'02, pp.1-10, 2002.

E. Parliament, European Parliament legislative resolution of 12 on the proposal for a regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data. General Data Protection Regulation, Ordinary legislative procedure: first reading, 2014.

M. Govan and T. Buggy, A Computationally Efficient Fingerprint Matching Algorithm for Implementation on Smartcards, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems, pp.1-6, 2007.
DOI : 10.1109/BTAS.2007.4401959

Y. Joseph, R. Halpern, and . Pucella, Dealing with logical omniscience, Conference on Theoretical Aspects of Rationality and Knowledge TARK'07, pp.169-176, 2007.

K. Anil, A. Jain, S. Ross, and . Prabhakar, An introduction to biometric recognition, IEEE Trans. Circuits Syst. Video Techn, vol.14, issue.1, pp.4-20, 2004.

S. International and . Organization, International standard iso/iec 24787:2010, information technology ? identification cards ? on-card biometric comparison, 2010.

R. Pucella, Deductive Algorithmic Knowledge, Journal of Logic and Computation, vol.16, issue.2, pp.287-309, 2006.
DOI : 10.1093/logcom/exi078

URL : http://arxiv.org/pdf/cs/0405038

R. L. Rivest, A. Shamir, and Y. Tauman, How to Leak a Secret, Advances in Cryptology ? ASIACRYPT'01, pp.552-565, 2001.
DOI : 10.1007/3-540-45682-1_32

. Vinh-thong, T. Ta, and . Antignac, Privacy by design: On the conformance between protocols and architectures, Foundations and Practice of Security ? FPS'14, pp.65-81, 2015.