Research Article

Privacy-Preserving Fingerprint Authentication Using D-H Key Exchange and Secret Sharing

Table 1

Related symbols and their specific meanings.

SymbolSpecific meaning

Cyclic groups of prime order
Two distinct generators of
A big prime, the order of and
The key used to encrypt original template
The identity of substorages
The pseudo-identity of
Cryptographic hash function for
The identities of matcher and
The secret key and public key of
The secret key and public key of
The secret key and public key of
Threshold