<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Neural network biometric cryptography system *</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alexey Vulfin</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vladimir Vasilyev</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrey Nikonov</string-name>
          <email>nikonovandrey1994@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anastasia Kirillova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Ufa State Aviation Technical University</institution>
          ,
          <addr-line>12, K.Marks st, Ufa, 450077, Russian Federation</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>In this paper, an approach to the construction of a neural network system of biometric authentication is proposed, which allows organizing the distributed stor-age of the base of biometric images and using a secret cryptographic key generated on the basis of the input biometric image as an output of the neural network. The object of the research is the biometric authentication system, and the subject of the research is the algorithms for converting parameters into a cryptographic key based on neural network technologies. The structure of a biometric authentication system has been developed, which identifies biometric features of a face image. The main difference between the developed system and existing solutions is the method of constructing a vector of primary biometric features based on neural network models and methods of machine learning and data mining, which allows assigning a unique private cryptographic key to each authentication subject. The mechanism of a distributed neural network representation of private key components significantly reduces the likelihood of compromising the vector of biomedical features. The use of the developed system and algorithms will make it possible to create highly reliable biometric security systems that ensure the ability of users to work with confidential information in open and weakly protected information systems.</p>
      </abstract>
      <kwd-group>
        <kwd>Information security</kwd>
        <kwd>Neural network</kwd>
        <kwd>Biometric</kwd>
        <kwd>Cryptography</kwd>
        <kwd>Image analysis</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        A promising trend in increasing the efficiency of authentication systems is the
integration of biometric and cryptographic methods in the task of converting biometric
parameters into an access key code (cryptographic key). The use of initial biometric
features for the generation of cryptographic keys has a number of difficulties:
biometric data is not clearly reproducible and does not have a uniform distribution of
parameters, while most cryptographic transformations are bijective and require an exact
key value [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5 ref6 ref7">1–7</xref>
        ].
      </p>
      <p>
        Biometric authentication systems, that using machine learning models,
approximate a set of multidimensional dividing hyperplanes in the space of selected features
of biometric templates, which makes it possible to isolate the templates of each
predefined class associated with the authentication subject. Systems whose output vector
reproduces the code of a predetermined class are vulnerable to attacks on the “last bit”
of the decision rule [
        <xref ref-type="bibr" rid="ref8 ref9">8-9</xref>
        ]. The use of neural network models in the core of the
authentication system is also associated with a number of disadvantages associated with the
need to retrain the neural network when adding a user and potential errors of the
second kind.
      </p>
      <p>The goal of the research is improvement of biometric authentication algorithms
due to neural network transformation of biometric features into a cryptographic key.</p>
      <p>To achieve the goal, the following tasks were set:
─ development of the structure of a neural network biometric authentication system
with the transformation of the vector of biometric features into a cryptographic
private key;
─ development of an algorithm for converting input biometric features into a
cryptographic “private” key in a neural network basis;
─ comparative analysis of the effectiveness of biometric authentication systems
based on machine learning models.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Materials and methods</title>
      <p>
        The algorithm of the neural network biometric authentication system with the
transformation “biometrics – code” (NNBA) includes five stages (Figure 1) [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14 ref15 ref16">10–20</xref>
        ].
      </p>
      <p>Image preprocessing. Image preprocessing performed as extraction of biometric
features from a “raw” biometric image. To train neural networks, a sample of data
was created with images of the faces of five users, which are presented in Figure 2.</p>
      <p>Image preprocessing is performed according to the diagram in the Figure 3.
5000 images from the video stream were selected for each of the classes. The
selected areas have been labeled and scaled to 256x256 pixels to contain the minimum
number of pixels outside the face of interest. Additionally, the images were
normalized by equalizing the histogram to normalize certain sections of frames with different
brightness. Also for some neural networks, color images were converted from a color
scheme (RGB) to grayscale with a 255-bit palette (grayscale). The negative sample
consists of 5000 images, also reduced to a size of 64x64 pixels.</p>
      <sec id="sec-2-1">
        <title>Coding and selection of features for building a base of biometric images. At the</title>
        <p>preprocessing stage, two training samples are prepared: positive and negative. A
“positive” training set consists of preprocessed images extracted from the video
stream and containing the user’s face (the subject of authentication). The “negative”
training set includes arbitrary images that do not contain fragments of a human face.
A sufficiently large number of examples in a “negative” training set in comparison
with a “positive” one allows the classifier model to use a larger number of images for
constructing dividing surfaces in the feature space and has a beneficial effect on the
learning outcomes of such models.</p>
        <p>It is proposed to coding features using the following steps:
─ images of all classes of positive and negative samples are represented as an integer
matrix of uniform size [n, n], in which each pixel is an integer in the range [0,
255], which corresponds to the representation of the image in grayscale;
─ the unified matrix is split line by line, and a column vector of size [n*n, 1] is
constructed. This step provides an invariant to displacement of the region of interest
(ROI) in the vertical direction;
─ each element of the column vector can be transformed into a reflective binary 8-bit
Gray code [21], and then the resulting matrix is again split into rows. A column
vector of size [8 * n * n, 1] is formed again from the received rows. Representation
of features in the form of Gray codes is due to the fact that two adjacent values of
the color scale differ only in one bit.</p>
        <p>Feature generation consists in projecting the primary vector into a new feature
space and forming a compact feature vector of each image for subsequent neural
network processing. A binary or integer vector is fed to the input of a neural network
unit, which implements a functional mapping of an image into a unique vector, which
acts as a private cryptographic key.</p>
        <p>It is proposed to use the following approaches for features generation:
Self-organizing two-dimensional Kohonen map (SOM). Figure 4 shows maps of
clustering of the feature vectors: user classes are displayed in yellow shades, a noisy
samples are displayed in red. The vectors of user attributes are visually divided into
three and five groups, which corresponds to the number of users in the system in the
first experiment on field data.</p>
        <p>Probabilistic principal component analysis (PPCA). The input of the PPCA [22]
algorithm is an array with data and the value of the space dimension to which the data
should be “compressed”.</p>
        <p>Figure 5 shows an example of highlighting two and three main components. Each
point corresponds to the image of the recognition object, in our case – the NNBA
users.</p>
        <p>a –
a
first experiment with 3 classes
– first experiment with 5 classes</p>
        <p>Thus, it is proposed to use the first n = 16 ... 32 distinguished main components as
a compact vector of features of a human face.</p>
        <p>Convolutional neural network (CNN). The outputs of the fully connected layer fc8
of the AlexNet convolutional network [23], consisting of 1000 neurons, providing the
integration of information about the facial features of a particular user, are used as a
compact vector of features.</p>
      </sec>
      <sec id="sec-2-2">
        <title>Creation of a base of images “biometrics – cryptographic key”. For each user of</title>
        <p>the system, whose images are used to extract biometric features, it is necessary to
match a previously generated cryptographic key.</p>
        <p>The private key is represented as an integer column vector [m, 1] of length m =
132. Each element of the vector is converted to a reflexive binary 8-bit Gray code.
The rows of the resulting matrix are converted to a column vector [8 * m, 1]. This
transformation is shown in Figure 6.</p>
        <p>For each class of input images of a positive sample, which are facial images of a
unique user, a single binary output vector is assigned, which is an encoded private
key.</p>
        <p>For each negative sample, a random private key in binary representation is
assigned.</p>
        <p>
          One of the following options is used as an input vector:
─ image as an integer column vector;
─ binary representation of the image as an integer column vector;
─ binary vector formed by the output neurons of the two-dimensional Kohonen map,
the input of which was an image in the form of an integer column vector;
─ real-valued vector of activations of the fc8 layer of the AlexNet convolutional
network, to the input of which a color image [
          <xref ref-type="bibr" rid="ref3">227, 227, 3</xref>
          ] of a person’s face was fed
in the RGB palette;
─ real-valued vector formed by the principal components of the corresponding input
image after projection using the PPCA method.
        </p>
        <p>Thus, the training sample is a set of pairs of input and output vectors.</p>
      </sec>
      <sec id="sec-2-3">
        <title>Neural network matching of compact vectors of biometric images to the cryp</title>
        <p>tographic keys. Matching of compact vectors of biometric images to the
cryptographic keys is implemented using the following methods:
─ use of bidirectional associative memory (BAM) [24];
─ single-layer and multilayer perceptrons.</p>
        <p>The algorithm for constructing an extended BAM is shown in Figure 7.</p>
      </sec>
      <sec id="sec-2-4">
        <title>Key recovery upon presentation of a biometric image. The final structure of the</title>
        <p>authentication system with neural network conversion of biometric parameters into a
cryptographic “private” key is shown in Figure 8.</p>
        <p>Fig. 8. The structure of a neural network biometric authentication system.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Results</title>
      <p>To assess the efficiency of the neural network transformation of the initial biometric
features into a cryptographic private key, several computational experiments with
using following models were carried out on field data (Table 1):
─ multilayer perceptron (MP);
─ PPCA and multilayer perceptron;
─ two-dimensional Kohonen map and multilayer perceptron;
─ convolutional neural network AlexNet and multilayer perceptron;
─ BAM based on B. Kosko’s neural network in the version of Y. Wang.</p>
      <p>
        The results of experiments on the training set are shown in the Table 2.
4
AlexNet + MP
[
        <xref ref-type="bibr" rid="ref3">227, 227, 3</xref>
        ]
in RGB palette
AlexNet (fc8
layer
activation neurons)
      </p>
      <p>1000
Real numbers</p>
      <p>1056
binary Gray
code</p>
      <p>MP
The main advantage of the Kohonen maps according to the results of experiments is
the best scores of the first kind error. However, to add a new authentication subject, it
is necessary to retrain the neural network. The PPCA method performs the
transformation of the feature vector without the need for a continuous learning process. The
use of convolutional neural networks allows to achieve the best sensitivity and
specificity by extracting complex features from the original images, but training such a
network requires significant computing resources.</p>
      <p>To match the compact vector of features isolated from the biometric image to the
private cryptographic key, multilayer perceptrons and hetero-associative memory
based on the BAM neural network were used.</p>
      <p>The use of a neural network implementation of BAM makes it possible to
effectively implement the mechanism of functional mapping of the feature vector into a
private cryptographic key. However, due to the high dimensionality of the input
feature vector and the large number of pairs of compared input (n) and output (p)
vectors, the total memory capacity is
m 
min(n, p)
(1)</p>
      <p>For feedforward neural networks, one hidden layer is sufficient to match input
biometric images and output private keys. Testing the system on a control set of
examples demonstrated the possibility of obtaining random output vectors for images of
users who are not subjects of authentication. If we refuse the use examples of negative
sampling when training the neural network core of the system, 42% of examples of
images of users who are not subjects of authentication are assigned by the system to
one of the available classes.
5</p>
    </sec>
    <sec id="sec-4">
      <title>Conclusion</title>
      <p>The paper proposes an approach that allows combining a biometric authentication
system module based on a machine learning model and a cryptographic module. The
neural network core of the system allows to organize the distributed storage of
biometric templates and implements the mapping of the input image into the generated
private cryptographic key.</p>
      <p>The structure of a neural network system for biometric authentication has been
developed, including a digital video stream processing module for extracting an image
of the authentication subject’s face. A distinctive feature is the way to transform the
vector of primary biometric signs into a compact vector using a self-organizing
Kohonen map, a convolutional network, a probabilistic principal component algorithm,
bi-directional hetero-associative memory, and a multilayer neural network. The next
neural network unit implements the process of functional mapping of a compact
vector of subject features into a unique private cryptographic key. Thus, it is possible to
organize distributed compact storage of the base of biometric images and reduce the
probability of compromise, since the whole process takes place in a neural network
basis, which is a “black box”.</p>
      <p>Application of this approach will make it possible to create highly reliable
biometric security systems that provide the ability for users to work with confidential
information in open and weakly protected information spaces.</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgments</title>
      <p>The reported study was funded by Ministry of Science and Higher Education of the
Russian Federation (information security) as part of research project № 1/2020.
17. Baek J., Susilo W., Zhou J.: New construction of fuzzy identity-based encryption.
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications
Security, 368–370, USA, ACM New York (2007).
18. Fang L. et al.: Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without</p>
      <p>ROM. IACR Cryptology ePrint Archive 2008, 139 (2008).
19. Fang L., Xia J. Full Security: Fuzzy Identity Based Encryption. IACR Cryptology ePrint</p>
      <p>Archive, 307 (2008).
20. Yang P., Cao Z., Dong X.: Fuzzy Identity Based Signature. IACR Cryptology EPrint
Archive 2008, 2 (2008).
21. Gray code https://ru.wikipedia.org/wiki/Код_Грея, last accessed 2020/12/24.
22. Tipping M.E., Bishop C.M.: Probabilistic principal component analysis. Journal of the</p>
      <p>Royal Statistical Society: Series B (Statistical Methodology), 61(3), 611-622 (1999).
23. Yuan Z.W., Zhang J.: Feature extraction and image retrieval based on AlexNet. In: Eighth
International Conference on Digital Image, 10033, 100330E, International Society for
Optics and Photonics (2016).
24. Kosko B.: Bidirectional associative memories. IEEE Transactions on Systems, man, and
Cybernetics, 18(1), 49-60 (1988).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Abu</surname>
            <given-names>Elreesh J.Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abu-Naser S</surname>
          </string-name>
          .S.:
          <article-title>Cloud Network Security Based on Biometrics Cryptography Intelligent Tutoring System (</article-title>
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Uludag</surname>
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pankanti</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prabhakar</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jain</surname>
            <given-names>A.K.</given-names>
          </string-name>
          :
          <article-title>Biometric cryptosystems: issues and challenges</article-title>
          ,
          <volume>92</volume>
          (
          <issue>6</issue>
          ),
          <fpage>948</fpage>
          -
          <lpage>960</lpage>
          , Proceedings of the IEEE (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Juels</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sudan</surname>
            <given-names>M.:</given-names>
          </string-name>
          <article-title>A fuzzy vault scheme</article-title>
          .
          <source>Designs, Codes and Cryptography</source>
          ,
          <volume>38</volume>
          (
          <issue>2</issue>
          ),
          <fpage>237</fpage>
          -
          <lpage>257</lpage>
          (
          <year>2006</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Nandakumar</surname>
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jain</surname>
            <given-names>A.K.</given-names>
          </string-name>
          :
          <article-title>Multibiometric Template Security Using Fuzzy Vault</article-title>
          .
          <source>In: Int. Conf. Biometrics: Theory, Applications and Systems</source>
          , Arlington,
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          , Proceedings of the IEEE (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Scheirer</surname>
            <given-names>W. J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boult</surname>
            <given-names>T.E.</given-names>
          </string-name>
          :
          <article-title>Cracking fuzzy vaults and biometric encryption</article-title>
          .
          <source>In: Biometrics Symposium</source>
          ,
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          , Proceedings of the IEEE (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Zhou</surname>
            <given-names>X.</given-names>
          </string-name>
          et al.:
          <article-title>Feature correlation attack on biometric privacy protection schemes</article-title>
          .
          <source>In: Intelligent Information Hiding and Multimedia Signal Processing</source>
          ,
          <fpage>1061</fpage>
          -
          <lpage>1065</lpage>
          , IIH-MSP (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>David</surname>
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jan</surname>
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dhinaharan</surname>
            <given-names>N.</given-names>
          </string-name>
          : Advances in Computer Science, Engineering &amp; Applications. In: Proceedings of the Second International Conference on Computer Science, Engineering and Applications,
          <volume>39</volume>
          -
          <fpage>41</fpage>
          , ICCSEA, New Delhi, India (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Barreno</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          et al.:
          <article-title>The security of machine learning</article-title>
          .
          <source>Machine Learning</source>
          ,
          <volume>81</volume>
          (
          <issue>2</issue>
          ),
          <fpage>121</fpage>
          -
          <lpage>148</lpage>
          (
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Kulikova</surname>
            <given-names>O.V.</given-names>
          </string-name>
          :
          <article-title>Biometric cryptographic systems and their usage</article-title>
          .
          <source>Information technology security</source>
          ,
          <volume>16</volume>
          (
          <issue>3</issue>
          ),
          <fpage>53</fpage>
          -
          <lpage>58</lpage>
          (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Chuikov</surname>
            <given-names>A.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vulfin</surname>
            <given-names>A.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vasiliev</surname>
            <given-names>V.I.:</given-names>
          </string-name>
          <article-title>A neural network system for converting user biometric features into a cryptographic key</article-title>
          .
          <source>In: Proceedings of Tomsk State University of Control Systems and Radioelectronics</source>
          ,
          <volume>21</volume>
          (
          <issue>3</issue>
          ) (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Scheidat</surname>
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vielhauer</surname>
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dittmann</surname>
            <given-names>J</given-names>
          </string-name>
          .:
          <article-title>Biometric hash generation and user authentication based on handwriting using secure sketches</article-title>
          .
          <source>In: Image and Signal Processing and Analysis</source>
          ,
          <volume>89</volume>
          -
          <fpage>94</fpage>
          ,
          <source>Proceedings of 6th International Symposium</source>
          (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Dodis</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reyzin</surname>
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smith</surname>
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. Advances in Cryptology</article-title>
          . In: Cachin C. and
          <string-name>
            <surname>Camenisch</surname>
            <given-names>J</given-names>
          </string-name>
          . (eds.),
          <volume>3027</volume>
          ,
          <fpage>79</fpage>
          -
          <lpage>100</lpage>
          , Springer, Verlag (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Turk</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pentland</surname>
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Face recognition using eigenfaces</article-title>
          .
          <source>Journal of Cognitive Neuroscience</source>
          <volume>3</volume>
          ,
          <issue>7286</issue>
          (
          <year>2001</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Dodis</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Katz</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reyzin</surname>
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smith</surname>
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Robust fuzzy extractors and authenticated key agreement from close secrets</article-title>
          .
          <source>Advances in Cryptology</source>
          ,
          <volume>4117</volume>
          ,
          <fpage>232</fpage>
          -
          <lpage>250</lpage>
          , Springer, Verlag (
          <year>2006</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Boyen</surname>
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dodis</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Katz</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ostrovsky</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smith</surname>
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Secure remote authentication using biometric data. Advances in Cryptology</article-title>
          . In: Cramer R. (ed.).
          <source>LNCS</source>
          ,
          <volume>3494</volume>
          ,
          <fpage>147</fpage>
          -
          <lpage>163</lpage>
          , Springer, Verlag (
          <year>2005</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Sahai</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Waters</surname>
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Fuzzy identity-based encryption</article-title>
          .
          <source>Proceedings of EUROCRYP. LNCS</source>
          ,
          <volume>3494</volume>
          ,
          <fpage>457</fpage>
          -
          <lpage>473</lpage>
          , Springer, Verlag (
          <year>2005</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>