Trans. on Pattern Analysis and Machine Intelligence
(TPAMI), 43(6):1981–1997.
EU Parliament (2016). EU Quantum Manifesto: A New Era
of Technology.
European Data Protection Supervisor (2018). Report on
logging to the SIS II at national level.
Gentry, C. (2009). Fully homomorphic encryption using
ideal lattices. In Proceedings of the forty-first annual
ACM symposium on Theory of computing, pages 169–
178.
Gilkalaye, B. P. and Derakhshani, R. (2021). Secure authen-
tication using a garbled circuit variant for arithmetic
circuits. In IEEE Intl. Symposium on Technologies for
Homeland Security (HST), pages 1–7. IEEE.
Gomez-Barrero, M., Galbally, J., Morales, A., and Fier-
rez, J. (2017a). Privacy-preserving comparison of
variable-length data with application to biometric
template protection. IEEE Access, 5(1):8606–8619.
Gomez-Barrero, M., Maiorana, E., Galbally, J., Campisi, P.,
and Fierrez, J. (2017b). Multi-biometric template pro-
tection based on Homomorphic Encryption. Pattern
Recognition, 67:149–163.
Iliashenko, I. and Zucca, V. (2021). Faster homomorphic
comparison operations for BGV and BFV. Proc. on
Privacy Enhancing Technologies, 2021(3):246–264.
ISO/IEC JTC1 SC27 Security Techniques (2022). ISO/IEC
24745:2022. Information Technology - Security Tech-
niques - Biometric Information Protection. Interna-
tional Organization for Standardization.
ISO/IEC JTC1 SC37 Biometrics (2011). ISO/IEC 19794-
2:2011 Information Technology - Biometric Data In-
terchange Formats - Part 2: Finger Minutiae Data.
International Organization for Standardization.
Jain, A., Prabhakar, S., Hong, L., and Pankanti, S. (2000).
Filterbank-based fingerprint matching. IEEE Trans.
on Image Processing, 9(5):846–859.
Kessler, R., Henninger, O., and Busch, C. (2021). Finger-
prints, forever young? In Proc. Intl. Conf. on Pattern
Recognition (ICPR), pages 8647–8654.
Kim, T., Oh, Y., and Kim, H. (2020). Efficient privacy-
preserving fingerprint-based authentication system us-
ing fully homomorphic encryption. Security and Com-
munication Networks, 2020.
Kolberg, J., Bauspieß, P., Gomez-Barrero, M., Rathgeb, C.,
D
¨
urmuth, M., and Busch, C. (2019). Template pro-
tection based on homomorphic encryption: Computa-
tionally efficient application to iris-biometric verifica-
tion and identification. In IEEE Workshop on Infor-
mation Forensics and Security (WIFS), pages 1–6.
Kolberg, J., Drozdowski, P., Gomez-Barrero, M., Rathgeb,
C., and Busch, C. (2020). Efficiency analysis of post-
quantum-secure face template protection schemes
based on homomorphic encryption. In Intl. Conf.
of the Biometrics Special Interest Group (BIOSIG),
pages 175–182. Gesellschaft f
¨
ur Informatik e.V.
Liu, E. and Zhao, Q. (2017). Encrypted domain matching of
fingerprint minutia cylinder-code (MCC) with l1 min-
imization. Neurocomputing, 259:3–13.
Lyubashevsky, V., Peikert, C., and Regev, O. (2010). On
ideal lattices and learning with errors over rings. In
Annual international conference on the theory and ap-
plications of cryptographic techniques, pages 1–23.
Springer.
Ortega-Garcia, J., Fierrez-Aguilar, J., Simon, D., Gon-
zalez, J., Faundez-Zanuy, M., Espinosa, V., Satue,
A., Hernaez, I., Igarza, J.-J., Vivaracho, C., et al.
(2003). MCYT baseline corpus: a bimodal biometric
database. IEE Proceedings-Vision, Image and Signal
Processing, 150(6):395–401.
Paillier, P. (1999). Public-key cryptosystems based on com-
posite degree residuosity classes. In Intl. Conf. on
the Theory and Applications of Cryptographic Tech-
niques, pages 223–238. Springer.
Rahman, M. M., Mishu, T. I., and Bhuiyan, M. A. A.
(2022). Performance analysis of a parameterized
minutiae-based approach for securing fingerprint tem-
plates in biometric authentication systems. Journal of
Information Security and Applications, 67:103209.
Rivest, R. L., Adleman, L., Dertouzos, M. L., et al. (1978).
On data banks and privacy homomorphisms. Founda-
tions of secure computation, 4(11):169–180.
Rohloff, K., Cousins, D., and Polyakov, Y. (2017). The
PALISADE Lattice Cryptography Library. https://git.
njit.edu/palisade/PALISADE.
Va
ˇ
zan, R. (2021). Sourceafis fingerprint matcher v3.13.0.
https://sourceafis.machinezoo.com/, accessed 2022-
01-18.
Yang, W., Wang, S., Yu, K., Kang, J. J., and Johnstone,
M. N. (2020). Secure fingerprint authentication with
homomorphic encryption. In Digital Image Comput-
ing: Techniques and Applications (DICTA), pages 1–
6. IEEE.
Yao, A. (1986). How to generate and exchange secrets. In
Annual Symposium on Foundations of Computer Sci-
ence (SFCS), pages 162–167. IEEE.
Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K., and
Koshiba, T. (2013). Packed homomorphic encryption
based on ideal lattices and its application to biomet-
rics. In Intl. Conf. on Availability, Reliability, and Se-
curity, pages 55–74. Springer.
Zhang, Y. and Koushanfar, F. (2016). Robust privacy-
preserving fingerprint authentication. In IEEE Intl.
Symposium on Hardware Oriented Security and Trust
(HOST), pages 1–6. IEEE.
ICISSP 2023 - 9th International Conference on Information Systems Security and Privacy
470