Abstract: In the existing two-factor revocable biometric template protection scheme, the uniform random permutation hashing (URP-IoM) algorithm is reliable and irreversible. However, this method ...
Abstract: Access control schemes in predicate encryption can effectively reduce the risk of information leakage in the inner product function encryption (IPFE). However, when we try to transition from ...