{"id":"https://openalex.org/W2118971792","doi":"https://doi.org/10.1109/tifs.2010.2091637","title":"Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme","display_name":"Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme","publication_year":2010,"publication_date":"2010-11-18","ids":{"openalex":"https://openalex.org/W2118971792","doi":"https://doi.org/10.1109/tifs.2010.2091637","mag":"2118971792"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2010.2091637","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2010.2091637","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://zenodo.org/record/3435269","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027076914","display_name":"Emile Kelkboom","orcid":null},"institutions":[{"id":"https://openalex.org/I4210122849","display_name":"Philips (Netherlands)","ror":"https://ror.org/02p2bgp27","country_code":"NL","type":"company","lineage":["https://openalex.org/I4210122849"]},{"id":"https://openalex.org/I4210131230","display_name":"Philips (United States)","ror":"https://ror.org/03kw6wr76","country_code":"US","type":"company","lineage":["https://openalex.org/I4210122849","https://openalex.org/I4210131230"]}],"countries":["NL","US"],"is_corresponding":true,"raw_author_name":"Emile J. C. Kelkboom","raw_affiliation_strings":["Philips Research, Netherlands","Philips Research, Eindhoven, NETHERLANDS"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Philips Research, Netherlands","institution_ids":["https://openalex.org/I4210122849"]},{"raw_affiliation_string":"Philips Research, Eindhoven, NETHERLANDS","institution_ids":["https://openalex.org/I4210131230"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004462789","display_name":"Jeroen Breebaart","orcid":null},"institutions":[{"id":"https://openalex.org/I4210122849","display_name":"Philips (Netherlands)","ror":"https://ror.org/02p2bgp27","country_code":"NL","type":"company","lineage":["https://openalex.org/I4210122849"]},{"id":"https://openalex.org/I4210166405","display_name":"Technolution (Netherlands)","ror":"https://ror.org/05d021z60","country_code":"NL","type":"company","lineage":["https://openalex.org/I4210166405"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Jeroen Breebaart","raw_affiliation_strings":["Philips Research, Netherlands","Civolution, Eindhoven, Netherlands"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Philips Research, Netherlands","institution_ids":["https://openalex.org/I4210122849"]},{"raw_affiliation_string":"Civolution, Eindhoven, Netherlands","institution_ids":["https://openalex.org/I4210166405"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010864946","display_name":"T.A.M. Kevenaar","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tom. A. M. Kevenaar","raw_affiliation_strings":["Priv-ID B.V., Netherlands","priv-ID, Eindhoven, Netherlands"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Priv-ID B.V., Netherlands","institution_ids":[]},{"raw_affiliation_string":"priv-ID, Eindhoven, Netherlands","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028001019","display_name":"Ileana Buhan","orcid":"https://orcid.org/0000-0001-5494-9164"},"institutions":[{"id":"https://openalex.org/I4210115710","display_name":"Siemens (Netherlands)","ror":"https://ror.org/02mt4w922","country_code":"NL","type":"company","lineage":["https://openalex.org/I1325886976","https://openalex.org/I4210115710"]},{"id":"https://openalex.org/I4210122849","display_name":"Philips (Netherlands)","ror":"https://ror.org/02p2bgp27","country_code":"NL","type":"company","lineage":["https://openalex.org/I4210122849"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Ileana Buhan","raw_affiliation_strings":["Philips Research, Netherlands","Siemens IT Solutions & Services, Zoetermeer, Netherlands"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Philips Research, Netherlands","institution_ids":["https://openalex.org/I4210122849"]},{"raw_affiliation_string":"Siemens IT Solutions & Services, Zoetermeer, Netherlands","institution_ids":["https://openalex.org/I4210115710"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031138348","display_name":"Raymond Veldhuis","orcid":"https://orcid.org/0000-0002-0381-5235"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Raymond N. J. Veldhuis","raw_affiliation_strings":["Fac. EEMCS, University of Twente, Netherlands","Fac. EEMCS, Univ. of Twente, Enschede, Netherlands"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Fac. EEMCS, University of Twente, Netherlands","institution_ids":["https://openalex.org/I94624287"]},{"raw_affiliation_string":"Fac. EEMCS, Univ. of Twente, Enschede, Netherlands","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5027076914"],"corresponding_institution_ids":["https://openalex.org/I4210122849","https://openalex.org/I4210131230"],"apc_list":null,"apc_paid":null,"fwci":13.8718,"has_fulltext":false,"cited_by_count":127,"citation_normalized_percentile":{"value":0.99345325,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"6","issue":"1","first_page":"107","last_page":"121"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10751","display_name":"Forensic and Genetic Research","score":0.9517999887466431,"subfield":{"id":"https://openalex.org/subfields/1311","display_name":"Genetics"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.80010586977005},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.5843439102172852},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5512470006942749},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.533289909362793},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.5260969400405884},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4798390567302704},{"id":"https://openalex.org/keywords/template","display_name":"Template","score":0.46890202164649963},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.45319756865501404},{"id":"https://openalex.org/keywords/template-matching","display_name":"Template matching","score":0.43708401918411255},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.434059739112854},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4159563183784485},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3420901894569397},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09015947580337524}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.80010586977005},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.5843439102172852},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5512470006942749},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.533289909362793},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.5260969400405884},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4798390567302704},{"id":"https://openalex.org/C82714645","wikidata":"https://www.wikidata.org/wiki/Q438331","display_name":"Template","level":2,"score":0.46890202164649963},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.45319756865501404},{"id":"https://openalex.org/C158096908","wikidata":"https://www.wikidata.org/wiki/Q3983303","display_name":"Template matching","level":3,"score":0.43708401918411255},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.434059739112854},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4159563183784485},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3420901894569397},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09015947580337524},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tifs.2010.2091637","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2010.2091637","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:ris.utwente.nl:openaire_cris_publications/68c8fe40-678a-42c6-8920-66665271df4c","is_oa":false,"landing_page_url":"https://research.utwente.nl/en/publications/68c8fe40-678a-42c6-8920-66665271df4c","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Kelkboom, E J C, Breebaart, J, Kevenaar, T A M, Buhan, I R & Veldhuis, R N J 2011, 'Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme', IEEE transactions on information forensics and security, vol. 6, no. 1, pp. 107-121. https://doi.org/10.1109/TIFS.2010.2091637","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:zenodo.org:3435269","is_oa":true,"landing_page_url":"https://zenodo.org/record/3435269","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"pmh:oai:zenodo.org:3435269","is_oa":true,"landing_page_url":"https://zenodo.org/record/3435269","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5899999737739563}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W17585283","https://openalex.org/W34942443","https://openalex.org/W1546438435","https://openalex.org/W1593558380","https://openalex.org/W1599789598","https://openalex.org/W1606443045","https://openalex.org/W1851882747","https://openalex.org/W1979408495","https://openalex.org/W1987266619","https://openalex.org/W2032551902","https://openalex.org/W2037420844","https://openalex.org/W2053438338","https://openalex.org/W2092988036","https://openalex.org/W2106137793","https://openalex.org/W2111251300","https://openalex.org/W2125587922","https://openalex.org/W2139340143","https://openalex.org/W3160027900","https://openalex.org/W6600695256","https://openalex.org/W6601449344","https://openalex.org/W6635598337","https://openalex.org/W6635598765","https://openalex.org/W6635981913","https://openalex.org/W6639151589"],"related_works":["https://openalex.org/W2361315595","https://openalex.org/W4200422973","https://openalex.org/W2602219756","https://openalex.org/W2092361839","https://openalex.org/W2360986010","https://openalex.org/W2383447469","https://openalex.org/W1605702723","https://openalex.org/W2371197140","https://openalex.org/W2089779414","https://openalex.org/W9684605"],"abstract_inverted_index":{"Template":[0],"protection":[1,19,44],"techniques":[2,45],"are":[3],"used":[4],"within":[5],"biometric":[6,101],"systems":[7],"in":[8],"order":[9],"to":[10],"safeguard":[11],"the":[12,15,33,40,42,53,63,71,81,86,89,96,104,118,126],"privacy":[13],"of":[14],"system's":[16],"subjects.":[17],"This":[18],"also":[20,50],"includes":[21],"unlinkability,":[22],"i.e.,":[23],"preventing":[24],"cross-matching":[25,68,92,123],"between":[26,88],"two":[27],"or":[28],"more":[29],"reference":[30],"templates":[31,73],"from":[32,103,122],"same":[34],"subject":[35],"across":[36],"different":[37],"applications.":[38],"In":[39],"literature,":[41],"template":[43],"based":[46,69,124],"on":[47,70,125],"fuzzy":[48,119],"commitment,":[49],"known":[51],"as":[52],"code-offset":[54],"construction,":[55],"have":[56],"recently":[57],"been":[58],"investigated.":[59],"Recent":[60],"work":[61],"presented":[62,97],"decodability":[64,127],"attack":[65],"vulnerability":[66],"facilitating":[67],"protected":[72],"and":[74,84,91],"its":[75],"theoretical":[76,82],"analysis.":[77],"First,":[78],"we":[79,109],"extend":[80],"analysis":[83,98],"include":[85],"comparison":[87],"system":[90],"performance.":[93],"We":[94],"validate":[95],"using":[99],"real":[100],"data":[102],"MCYT":[105],"fingerprint":[106],"database.":[107],"Second,":[108],"show":[110],"that":[111],"applying":[112],"a":[113],"random":[114],"bit-permutation":[115],"process":[116],"secures":[117],"commitment":[120],"scheme":[121],"attack.":[128]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":13},{"year":2015,"cited_by_count":9},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":8},{"year":2012,"cited_by_count":28}],"updated_date":"2026-05-15T08:27:34.491423","created_date":"2016-06-24T00:00:00"}
