Research Article

An Efficient and Privacy-Preserving Biometric Identification Scheme Based on the FITing-Tree

Table 1

Definition of main variables in our proposed scheme.

NotationDefinition

The private key of the SHE
The encryption process of the SHE scheme
The decryption process of the SHE scheme
The threshold of the identification system
The Euclidean distance between and
The threshold of the FITing-tree segment
The segments of the FITing-tree
The divided partitions while calculating the iDistance