{"id":"https://openalex.org/W2766923547","doi":"https://doi.org/10.1007/978-3-319-69471-9_39","title":"An Efficient Privacy-Preserving Palmprint Authentication Scheme Based on Homomorphic Encryption","display_name":"An Efficient Privacy-Preserving Palmprint Authentication Scheme Based on Homomorphic Encryption","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2766923547","doi":"https://doi.org/10.1007/978-3-319-69471-9_39","mag":"2766923547"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-69471-9_39","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-69471-9_39","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018915353","display_name":"Huiyong Wang","orcid":"https://orcid.org/0000-0001-5886-9647"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huiyong Wang","raw_affiliation_strings":["School of Mathematics and Computing Science, Guilin University of Electronics Technology, Guilin, Guangxi, People\u2019s Republic of China","School of Mathematics and Computing Science, Guilin University of Electronics Technology, Guilin, Guangxi, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Computing Science, Guilin University of Electronics Technology, Guilin, Guangxi, People\u2019s Republic of China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"School of Mathematics and Computing Science, Guilin University of Electronics Technology, Guilin, Guangxi, People's Republic of China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078775578","display_name":"Yong Ding","orcid":"https://orcid.org/0000-0002-3571-7576"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yong Ding","raw_affiliation_strings":["Guangxi Key Laboratory of Cryptography and Information Security, School of Computer Science and Information Security, Guilin University of Electronics Technology, Guilin, Guangxi, People\u2019s Republic of China","Guangxi Key Laboratory of Cryptography and Information Security, School of Computer Science and Information Security, Guilin University of Electronics Technology, Guilin, Guangxi, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, School of Computer Science and Information Security, Guilin University of Electronics Technology, Guilin, Guangxi, People\u2019s Republic of China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, School of Computer Science and Information Security, Guilin University of Electronics Technology, Guilin, Guangxi, People's Republic of China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101890868","display_name":"Shijie Tang","orcid":"https://orcid.org/0000-0002-3954-9944"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shijie Tang","raw_affiliation_strings":["Guangxi Key Laboratory of Intelligent Integrated Automation, School of Electronic Engineering and Automation, Guilin University of Electronics Technology, Guilin, Guangxi, People\u2019s Republic of China","Guangxi Key Laboratory of Intelligent Integrated Automation, School of Electronic Engineering and Automation, Guilin University of Electronics Technology, Guilin, Guangxi, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Intelligent Integrated Automation, School of Electronic Engineering and Automation, Guilin University of Electronics Technology, Guilin, Guangxi, People\u2019s Republic of China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"Guangxi Key Laboratory of Intelligent Integrated Automation, School of Electronic Engineering and Automation, Guilin University of Electronics Technology, Guilin, Guangxi, People's Republic of China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022063754","display_name":"Jilin Wang","orcid":"https://orcid.org/0000-0001-8385-253X"},"institutions":[{"id":"https://openalex.org/I90727586","display_name":"Zhejiang University of Finance and Economics","ror":"https://ror.org/055vj5234","country_code":"CN","type":"education","lineage":["https://openalex.org/I90727586"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jilin Wang","raw_affiliation_strings":["Information School, Zhejiang University of Finance and Economics, Hangzhou, Zhejiang, People\u2019s Republic of China","Information School, Zhejiang University of Finance and Economics, Hangzhou, Zhejiang, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"Information School, Zhejiang University of Finance and Economics, Hangzhou, Zhejiang, People\u2019s Republic of China","institution_ids":["https://openalex.org/I90727586"]},{"raw_affiliation_string":"Information School, Zhejiang University of Finance and Economics, Hangzhou, Zhejiang, People's Republic of China","institution_ids":["https://openalex.org/I90727586"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5078775578"],"corresponding_institution_ids":["https://openalex.org/I5343935"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.6684,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.69799907,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"503","last_page":"512"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9797999858856201,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9656000137329102,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8558703660964966},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8004775047302246},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.6787814497947693},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6159529089927673},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6104366779327393},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5073348879814148},{"id":"https://openalex.org/keywords/elgamal-encryption","display_name":"ElGamal encryption","score":0.49177077412605286},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4818250238895416},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.44926708936691284},{"id":"https://openalex.org/keywords/hamming-distance","display_name":"Hamming distance","score":0.44167324900627136},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3611752986907959},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34558671712875366},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.32113540172576904},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3180665671825409},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.23201367259025574},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09768983721733093}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8558703660964966},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8004775047302246},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.6787814497947693},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6159529089927673},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6104366779327393},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5073348879814148},{"id":"https://openalex.org/C11045955","wikidata":"https://www.wikidata.org/wiki/Q1162410","display_name":"ElGamal encryption","level":4,"score":0.49177077412605286},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4818250238895416},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.44926708936691284},{"id":"https://openalex.org/C193319292","wikidata":"https://www.wikidata.org/wiki/Q272172","display_name":"Hamming distance","level":2,"score":0.44167324900627136},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3611752986907959},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34558671712875366},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32113540172576904},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3180665671825409},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.23201367259025574},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09768983721733093},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-69471-9_39","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-69471-9_39","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5299999713897705,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W179458199","https://openalex.org/W1488338708","https://openalex.org/W1534388293","https://openalex.org/W1623873962","https://openalex.org/W1798609567","https://openalex.org/W1996360405","https://openalex.org/W2037757210","https://openalex.org/W2041942569","https://openalex.org/W2046182649","https://openalex.org/W2053059469","https://openalex.org/W2063355793","https://openalex.org/W2085895474","https://openalex.org/W2087044821","https://openalex.org/W2089497633","https://openalex.org/W2096250549","https://openalex.org/W2132172731","https://openalex.org/W2143103810","https://openalex.org/W2170024232","https://openalex.org/W2333546754","https://openalex.org/W2528931573","https://openalex.org/W4210300416","https://openalex.org/W4232836212"],"related_works":["https://openalex.org/W2312500729","https://openalex.org/W2518050971","https://openalex.org/W2026228941","https://openalex.org/W3106998306","https://openalex.org/W2985442649","https://openalex.org/W1484081998","https://openalex.org/W2902659942","https://openalex.org/W4289129300","https://openalex.org/W2963996977","https://openalex.org/W3012189029"],"abstract_inverted_index":null,"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
