Research Article
An Efficient and Privacy-Preserving Biometric Identification Scheme Based on the FITing-Tree
Table 1
Definition of main variables in our proposed scheme.
| Notation | Definition |
| | The private key of the SHE | | The encryption process of the SHE scheme | | The decryption process of the SHE scheme | | The threshold of the identification system | | The Euclidean distance between and | | The threshold of the FITing-tree segment | | The segments of the FITing-tree | | The divided partitions while calculating the iDistance |
|
|