• 1
    Sahai A, Waters B. Fuzzy identity-based encryption. In EUROCRYPT 2005, LNCS, Vol. 3494, Cramer R (ed). Springer-Verlag. Springer: Heidelberg, 2001; 457473.
  • 2
    Shamir A. Identity-based cryptosystems and signature schemes. In CRYPTO 1984, LNCS, Vol. 196, Blakely GR (ed). Springer-Verlag. Springer: Heidelberg, 1985; 4753.
  • 3
    Dodis Y, Reyzin L, Smith A. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In EUROCRYPT 2004, LNCS, Vol. 3027, Cachin C, Camenisch C (eds). Springer-Verlag: Springer, Heidelberg, 2004; 523540.
  • 4
    Sarier ND. A new biometric identity based encryption scheme. In International Conference for Young Computer Science 2008, Wang G (eds). IEEE Press: Zhang Jia Jie, Hunan, China, 2008; 20612066.
  • 5
    Sarier ND. A new biometric identity based encryption scheme secure against DoS attacks. Security and Communication Networks 2009; 4:2332.
  • 6
    Sarier ND. Generic constructions of biometric identity based encryption systems. In WISTP 2010, LNCS, Vol. 6033, Samarati P et al. (ed). Springer-Verlag: Springer, Heidelberg, 2010; 90105.
  • 7
    Shi W, Jang I, Yoo HS. An improved fuzzy identity-based encryption scheme with constant size ciphertext. JDCTA 2010; 4:4, 714.
  • 8
    Sarier ND. A new approach for biometric template storage and remote authentication. In ICB'09, Vol. 5558 of LNCS, Springer: Alghero, Italy, 2009; 909918.
  • 9
    FRR. In Wikipedia, The Free Encyclopedia. Retrieved August 28, 2010, from
  • 10
    FAR. In Wikipedia, The Free Encyclopedia. Retrieved August 28, 2010, from
  • 11
    Hocquenghem A. In Codes correcteurs d'erreurs (in French). Chiffres (Paris), 1959; 2: 147156.
  • 12
    Bose RC, Ray-Chaudhuri DK. On a class of error correcting binary group codes. Information and Control 1960; 3(1): 6879, ISSN 0890-5401.
  • 13
    Jain A, Nandakumar K, Nagar A. Biometric template security. EURASIP Journal on Advances in Signal Processing 2008; 117.
  • 14
    Sakai R, Kasahara M. ID based cryptosystems with pairing on elliptic curve, Cryptology ePrint Archive, Report 2003/054, 2003.
  • 15
    Teoh ABJ, Goh A, Ngo DCL. Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Transactions on PAMI December 2006; 28(12): 18921901.
  • 16
    Xi K, Hu J. Biometric mobile template protection: a composite feature based fingerprint fuzzy vault, IEEE International Conference on Communications, Dresden, Germany, 2009.
  • 17
    Ahmad T, Hu J, Wang S. Pair-polar coordinate based cancellable fingerprint templates. In Pattern Recognition. Elsevier, 2011. DOI:10.1016/j.patcog.2011.03.015.
  • 18
    Jin Z, Teoh ABJ, Ong TS, Tee C. A revocable fingerprint template for security and privacy preserving. KSII Transaction on Internet and Information System 2010; 4(6):13271342.
  • 19
    Xi K, Hu J. Introduction to bio-cryptography. In Handbook of Information and Communication Security. Springer Verlag, 2010. DOI:10.1007/978-3-642-04117-4.
  • 20
    Xi K, Ahmad T, Han F, Hu J. A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment, Special Issue on Biometric Security for Mobile Computing. Journal of Security and Communication Networks, John Wiley, 2011; 4(5): 487499, DOI: 10.1002/sec.225.
  • 21
    Tan S-Y, Jin Z, Teoh ABJ, Goi B-M, Heng S-H. On the realization of fuzzy identity-based identification scheme using fingerprint biometrics. Journal of Security and Communication Networks, DOI: 10.1002/sec.408.
  • 22
    Tan S-Y, Heng S-H, Goi B-M. Java implementation for pairing-based cryptosystems. In ICCSA 2010, LNCS, Vol. 6019, Taniar D, Gervasi O, Murgante B, Pardede E, Apduhan B (eds). Springer-Verlag: Springer, Heidelberg, 2010; 188198.
  • 23
    Tan S-Y, Heng S-H, Goi B-M, Moon S. Java implementation for identity-based identification. International Journal of Cryptology Research 1: 2132, Malaysian Society for Cryptology Research.
  • 24
    Xu H. Veldhuis, RN. Binary representations of fingerprint spectral minutiae features, Proc. 20th Int. Conf. on Pattern Recognition (ICPR'10), 2010; 12121216.
  • 25
    Nagar A, Rane S, Vetro A. Privacy and security of features extracted from minutiae aggregates, in Proceedings IEEE Intl Conf. on Acoustics, Speech and Signal Processing, Dallas, March 2010; 524531.
  • 26
    Li P, Yang X, Qiao H, Cao K. Liu E, Tian J. An effective biometric cryptosystem combining fingerprints with error correction codes, Expert Systems with Applications, 2012; 39(7, 1): 65626574, June 10.1016/j.eswa.2011.12.048.
  • 27
    Chen C, Veldhuis R. Binary biometric representation through pairwise adaptive phase quantization. EURASIP Journal on Information Security 2011; 2011: (1): 543106, Feb.
  • 28
    Lim MH, Teoh ABJ, Toh KA. An efficient dynamic reliability-dependent bit allocation for biometric discretization. Pattern Recognition 2012; 45(5):19601971.
  • 29
    Chen L, Cheng Z. Security proof of Sakai–Kasahara's identitybased encryption scheme. Cryptography and Coding, IMA Int. Conf., LNCS 3796: 442459.
  • 30
    E Fujisaki, T Okamoto. Secure integration of asymmetric and symmetric encryption schemes. In Proceedings of Advances in Cryptology – CRYPTO '99, LNCS 1666, 1999; 535554.
  • 31
    Yang Y, Hu Y, Zhang L, Sun C. CCA2 secure biometric identity based encryption with constant-size ciphertext. Journal of Zhejiang University, DOI:10.1631/jzus.C1000429.