Input: the encrypted template | | from Bob, and query minutiae from Alice | Output: Alice gets a blind list | between and . | (1) Bob chooses , , concatenates them as strings: | ,⋯,, | where . For , …, , | he computes , where , | and so forth and , , . He sends these cipher texts to Alice. | (2) Alice decrypts , …, and obtains and | by parsing into , and bit chunks respectively. | For , …, and , …, , she computes , | | and . |
|