{"id":"https://openalex.org/W3211639626","doi":"https://doi.org/10.1145/3460120.3484586","title":"Revisiting Fuzzy Signatures: Towards a More Risk-Free Cryptographic Authentication System based on Biometrics","display_name":"Revisiting Fuzzy Signatures: Towards a More Risk-Free Cryptographic Authentication System based on Biometrics","publication_year":2021,"publication_date":"2021-11-12","ids":{"openalex":"https://openalex.org/W3211639626","doi":"https://doi.org/10.1145/3460120.3484586","mag":"3211639626"},"language":"en","primary_location":{"id":"doi:10.1145/3460120.3484586","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3460120.3484586","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2112.08658","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045165395","display_name":"Shuichi Katsumata","orcid":"https://orcid.org/0000-0002-8496-0476"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Shuichi Katsumata","raw_affiliation_strings":["AIST, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"AIST, Tokyo, Japan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009841755","display_name":"Takahiro Matsuda","orcid":"https://orcid.org/0000-0002-2882-3901"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Takahiro Matsuda","raw_affiliation_strings":["AIST, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"AIST, Tokyo, Japan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073230864","display_name":"Wataru Nakamura","orcid":null},"institutions":[{"id":"https://openalex.org/I65143321","display_name":"Hitachi (Japan)","ror":"https://ror.org/02exqgm79","country_code":"JP","type":"company","lineage":["https://openalex.org/I65143321"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Wataru Nakamura","raw_affiliation_strings":["Hitachi, Ltd., Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Hitachi, Ltd., Tokyo, Japan","institution_ids":["https://openalex.org/I65143321"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050195240","display_name":"Kazuma Ohara","orcid":"https://orcid.org/0000-0003-0213-3942"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kazuma Ohara","raw_affiliation_strings":["AIST, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"AIST, Tokyo, Japan","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102144021","display_name":"Kenta Takahashi","orcid":"https://orcid.org/0000-0003-4542-8484"},"institutions":[{"id":"https://openalex.org/I65143321","display_name":"Hitachi (Japan)","ror":"https://ror.org/02exqgm79","country_code":"JP","type":"company","lineage":["https://openalex.org/I65143321"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kenta Takahashi","raw_affiliation_strings":["Hitachi, Ltd., Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Hitachi, Ltd., Tokyo, Japan","institution_ids":["https://openalex.org/I65143321"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5045165395"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.3851,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.81967653,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"2046","last_page":"2065"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.852927029132843},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.8219146728515625},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7128699421882629},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.6354504823684692},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5884981751441956},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5515925884246826},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5117592811584473},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.5092228651046753},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.4418065845966339},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.43568745255470276},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.43444958329200745},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.42809075117111206},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.26239269971847534},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.1677098274230957},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.11313483119010925}],"concepts":[{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.852927029132843},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.8219146728515625},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7128699421882629},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.6354504823684692},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5884981751441956},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5515925884246826},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5117592811584473},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.5092228651046753},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.4418065845966339},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.43568745255470276},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.43444958329200745},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.42809075117111206},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.26239269971847534},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.1677098274230957},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.11313483119010925},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3460120.3484586","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3460120.3484586","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2112.08658","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2112.08658","pdf_url":"https://arxiv.org/pdf/2112.08658","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2112.08658","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2112.08658","pdf_url":"https://arxiv.org/pdf/2112.08658","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W50132804","https://openalex.org/W1545672070","https://openalex.org/W1974821667","https://openalex.org/W1983989471","https://openalex.org/W2004617923","https://openalex.org/W2015880590","https://openalex.org/W2052713505","https://openalex.org/W2164736940","https://openalex.org/W2169194339","https://openalex.org/W2169513470","https://openalex.org/W2342825170","https://openalex.org/W2570008916","https://openalex.org/W2771581950","https://openalex.org/W3021402855","https://openalex.org/W4210896998","https://openalex.org/W4256642426","https://openalex.org/W4298193418","https://openalex.org/W4320300927"],"related_works":["https://openalex.org/W143386018","https://openalex.org/W2656445685","https://openalex.org/W1004582678","https://openalex.org/W2115218409","https://openalex.org/W2076845124","https://openalex.org/W2090949570","https://openalex.org/W3104966193","https://openalex.org/W2892743407","https://openalex.org/W773319083","https://openalex.org/W2776010770"],"abstract_inverted_index":{"Biometric":[0],"authentication":[1,11,24],"is":[2,127],"one":[3],"of":[4,40,109,116,122],"the":[5,22,44,70,103,106,110,114,120],"promising":[6],"alternatives":[7],"to":[8,58,93],"standard":[9],"password-based":[10],"offering":[12],"better":[13],"usability":[14],"and":[15],"security.":[16],"In":[17],"this":[18],"work,":[19],"we":[20],"revisit":[21],"biometric":[23,62],"based":[25],"on":[26,67,105],"fuzzy":[27,68,71,85,123],"signatures":[28,42,86,124],"introduced":[29],"by":[30],"Takahashi":[31],"et":[32],"al.":[33],"(ACNS'15,":[34],"IJIS'19).":[35],"These":[36],"are":[37],"special":[38],"types":[39],"digital":[41],"where":[43],"secret":[45],"signing":[46],"key":[47],"can":[48],"be":[49],"a":[50,75],"''fuzzy''":[51],"data":[52],"such":[53],"as":[54,64,113],"user's":[55],"biometrics.":[56],"Compared":[57],"other":[59],"cryptographically":[60],"secure":[61],"authentications":[63],"those":[65],"relying":[66],"extractors,":[69],"signature-based":[72],"scheme":[73],"provides":[74],"more":[76],"attractive":[77],"security":[78,121],"guarantee.":[79],"However,":[80],"despite":[81],"their":[82,94],"potential":[83],"values,":[84],"have":[87],"not":[88],"attracted":[89],"much":[90],"attention":[91],"owing":[92],"theory-oriented":[95],"presentations":[96],"in":[97],"all":[98],"prior":[99],"works.":[100],"For":[101],"instance,":[102],"discussion":[104],"practical":[107],"feasibility":[108],"assumptions":[111],"(such":[112],"entropy":[115],"user":[117],"biometrics),":[118],"which":[119],"hinges":[125],"on,":[126],"completely":[128],"missing.":[129]},"counts_by_year":[{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":5}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2021-11-22T00:00:00"}
