{"id":"https://openalex.org/W3133850920","doi":"https://doi.org/10.1109/wifs49906.2020.9360881","title":"Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection","display_name":"Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection","publication_year":2020,"publication_date":"2020-12-06","ids":{"openalex":"https://openalex.org/W3133850920","doi":"https://doi.org/10.1109/wifs49906.2020.9360881","mag":"3133850920"},"language":"en","primary_location":{"id":"doi:10.1109/wifs49906.2020.9360881","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs49906.2020.9360881","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053420666","display_name":"Pia Bauspies","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Pia Bauspies","raw_affiliation_strings":["da/sec - Biometrics and Internet Security, University of Applied Sciences Darmstadt"],"affiliations":[{"raw_affiliation_string":"da/sec - Biometrics and Internet Security, University of Applied Sciences Darmstadt","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061163098","display_name":"Jascha Kolberg","orcid":"https://orcid.org/0000-0002-3128-8049"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jascha Kolberg","raw_affiliation_strings":["da/sec - Biometrics and Internet Security, University of Applied Sciences Darmstadt"],"affiliations":[{"raw_affiliation_string":"da/sec - Biometrics and Internet Security, University of Applied Sciences Darmstadt","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078772146","display_name":"Daniel Demmler","orcid":"https://orcid.org/0000-0001-6334-6277"},"institutions":[{"id":"https://openalex.org/I159176309","display_name":"Universit\u00e4t Hamburg","ror":"https://ror.org/00g30e956","country_code":"DE","type":"education","lineage":["https://openalex.org/I159176309"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Daniel Demmler","raw_affiliation_strings":["University of Hamburg"],"affiliations":[{"raw_affiliation_string":"University of Hamburg","institution_ids":["https://openalex.org/I159176309"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061353492","display_name":"Juliane Kr\u00e4mer","orcid":"https://orcid.org/0000-0002-3599-4215"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Juliane Kramer","raw_affiliation_strings":["Technical University Darmstadt"],"affiliations":[{"raw_affiliation_string":"Technical University Darmstadt","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017716310","display_name":"Christoph Busch","orcid":"https://orcid.org/0000-0002-9159-2923"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Christoph Busch","raw_affiliation_strings":["da/sec - Biometrics and Internet Security, University of Applied Sciences Darmstadt"],"affiliations":[{"raw_affiliation_string":"da/sec - Biometrics and Internet Security, University of Applied Sciences Darmstadt","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5053420666"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.4565,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.63987159,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8017216920852661},{"id":"https://openalex.org/keywords/secure-two-party-computation","display_name":"Secure two-party computation","score":0.6395124793052673},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.5868151187896729},{"id":"https://openalex.org/keywords/iris-recognition","display_name":"Iris recognition","score":0.5682536363601685},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5355534553527832},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5310400128364563},{"id":"https://openalex.org/keywords/quantum-computer","display_name":"Quantum computer","score":0.5189085602760315},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4494219124317169},{"id":"https://openalex.org/keywords/trusted-third-party","display_name":"Trusted third party","score":0.4310562312602997},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.405388742685318},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.40393900871276855},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.4034700095653534},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34525662660598755},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.19276708364486694}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8017216920852661},{"id":"https://openalex.org/C13652956","wikidata":"https://www.wikidata.org/wiki/Q7444883","display_name":"Secure two-party computation","level":4,"score":0.6395124793052673},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.5868151187896729},{"id":"https://openalex.org/C112356035","wikidata":"https://www.wikidata.org/wiki/Q1672722","display_name":"Iris recognition","level":3,"score":0.5682536363601685},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5355534553527832},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5310400128364563},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.5189085602760315},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4494219124317169},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.4310562312602997},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.405388742685318},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.40393900871276855},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.4034700095653534},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34525662660598755},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.19276708364486694},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wifs49906.2020.9360881","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wifs49906.2020.9360881","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W178227285","https://openalex.org/W586426220","https://openalex.org/W1480491915","https://openalex.org/W1488338708","https://openalex.org/W1969009977","https://openalex.org/W1974821667","https://openalex.org/W1985110735","https://openalex.org/W2022596562","https://openalex.org/W2071825329","https://openalex.org/W2092422002","https://openalex.org/W2121956088","https://openalex.org/W2129905915","https://openalex.org/W2147668280","https://openalex.org/W2507096059","https://openalex.org/W2898733944","https://openalex.org/W2951744129","https://openalex.org/W2977364006","https://openalex.org/W2983530974","https://openalex.org/W3011722241","https://openalex.org/W3023853934","https://openalex.org/W3141585064","https://openalex.org/W3159524391","https://openalex.org/W4250498021","https://openalex.org/W6607197667","https://openalex.org/W6629194106","https://openalex.org/W6770365982","https://openalex.org/W6794913502"],"related_works":["https://openalex.org/W2166322483","https://openalex.org/W2182952131","https://openalex.org/W2168067755","https://openalex.org/W2343374647","https://openalex.org/W2291346748","https://openalex.org/W1518057863","https://openalex.org/W2111066711","https://openalex.org/W1587595757","https://openalex.org/W2560917486","https://openalex.org/W2044277243"],"abstract_inverted_index":{"Thinking":[0],"about":[1],"the":[2,36,43,63,73,86,96,100,134,158],"protection":[3,33,84],"of":[4,17,42,75,85,124,136,161],"biometric":[5,18,76,87,131,147],"data,":[6],"future":[7],"attacks":[8,144],"using":[9],"a":[10,27,120,141,146],"quantum":[11],"computer":[12],"call":[13],"for":[14,72,143,175],"adequate":[15],"resistance":[16],"verification":[19,155],"systems.":[20],"Such":[21],"systems":[22],"are":[23,91],"often":[24],"deployed":[25],"on":[26],"long-term":[28],"basis":[29],"and":[30,39,61,93],"deserve":[31],"strong":[32],"due":[34],"to":[35],"sensitive":[37],"nature":[38],"persistence":[40],"property":[41],"data":[44,88],"they":[45],"contain.":[46],"To":[47],"achieve":[48],"efficient":[49],"template":[50,77],"protection,":[51],"we":[52,102,165],"combine":[53],"post-quantum":[54,67,122,149],"secure":[55,68],"two-party":[56,69,116],"computation":[57,70,117],"with":[58],"secret":[59],"sharing":[60],"apply":[62],"first":[64],"practically":[65],"implemented":[66],"protocol":[71],"purpose":[74],"protection.":[78],"The":[79],"proposed":[80,163],"system":[81],"ensures":[82],"permanent":[83],"as":[89,110],"templates":[90],"stored":[92],"compared":[94],"in":[95,145],"encrypted":[97],"domain.":[98],"For":[99,133],"verification,":[101],"present":[103],"two":[104],"options":[105],"which":[106,139],"can":[107],"be":[108],"achieved":[109],"real-time":[111,167],"transactions:":[112],"A":[113],"well-established":[114],"classical":[115],"scheme":[118],"or":[119],"recent":[121],"upgrade":[123],"that":[125],"scheme.":[126],"Both":[127],"methods":[128],"maintain":[129],"full":[130],"performance.":[132],"database":[135],"reference":[137],"templates,":[138],"is":[140,151],"target":[142],"system,":[148,164],"security":[150],"maintained":[152],"throughout":[153],"both":[154],"options.":[156],"Regarding":[157],"computational":[159,168],"efficiency":[160],"our":[162,172],"offer":[166],"transaction":[169],"times,":[170],"making":[171],"solution":[173],"relevant":[174],"practical":[176],"applications.":[177]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2}],"updated_date":"2026-03-05T09:29:38.588285","created_date":"2025-10-10T00:00:00"}
