J. J. Abrams, J. Star-trek-adjedj, H. Bringer, B. K. Chabanne, G. Ahlswede et al., Biometric identification over encrypted data made feasible Identification via channels. Information Theory On identification via multiway channels with feedback. Information Theory Cryptographic processors ? a survey, Fifth International Conference on Information Systems Security Proceedings of the IEEE, pp.15-291519, 1989.

A. Andoni and P. Indyk, Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions, Communications of the ACM, vol.51, issue.1, pp.117-122, 2008.
DOI : 10.1145/1327452.1327494

R. Ang, R. Safavi-naini, and L. Mcaven, Cancelable keybased fingerprint templates, pp.242-252
DOI : 10.1007/11506157_21

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.474.332

S. Ar, R. J. Lipton, R. Rubinfeld, and M. Sudan, Reconstructing Algebraic Functions from Mixed Data, IEEE Transactions on Circuits and Systems for Video Technology, pp.487-51086, 1998.
DOI : 10.1137/S0097539796297577

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.23.4076

M. Asker, S. H. Bazen, and . Gerez, Systematic methods for the computation of the directional fields and singular points of fingerprints, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.24, issue.7, pp.905-919, 2002.

M. Bellare, A. Boldyreva, and A. Neill, Deterministic and Efficiently Searchable Encryption, CRYPTO'07, pp.535-552, 2007.
DOI : 10.1007/978-3-540-74143-5_30

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.377.2792

M. Bellare and P. Rogaway, Entity Authentication and Key Distribution, CRYPTO '93: Proceedings of the 13th annual international cryptology conference on Advances in cryptology, pp.232-249, 1993.
DOI : 10.1007/3-540-48329-2_21

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.62.3423

J. M. Berger, A note on error detection codes for asymmetric channels, Information and Control, vol.4, issue.1, pp.68-73, 1961.
DOI : 10.1016/S0019-9958(61)80037-5

T. Berger, Rate-Distortion Theory, A Mathematical Basis for Data Compression, 1971.

J. Bethencourt, D. X. Song, and B. Waters, New constructions and practical applications for private stream searching (extended abstract), IEEE Symposium on Security and Privacy, pp.132-139, 2006.

H. Burton and . Bloom, Space/time trade-offs in hash coding with allowable errors, Commun. ACM, vol.13, issue.7, pp.422-426, 1970.

M. Ruud, J. H. Bolle, N. K. Connell, and . Ratha, Biometric perils and patches, Pattern Recognition, vol.35, issue.12, pp.2727-2738, 2002.

D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, Public Key Encryption with Keyword Search, EURO- CRYPT'04, pp.506-522, 2004.
DOI : 10.1007/978-3-540-24676-3_30

D. Boneh, E. Kushilevitz, R. Ostrovsky, W. E. Skeith, and I. , Public Key Encryption That Allows PIR Queries, pp.50-67, 2007.
DOI : 10.1007/978-3-540-74143-5_4

R. Chandra-bose and D. , On a class of error correcting binary group codes, Information and Control, vol.3, issue.1, pp.68-79, 1960.
DOI : 10.1016/S0019-9958(60)90287-4

C. Boyd and J. M. Nieto, Information Security and Privacy, 10th Australasian Conference, Proceedings, 2005.

X. Boyen, Reusable cryptographic fuzzy extractors, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.82-91, 2004.
DOI : 10.1145/1030083.1030096

G. Brassard and L. Salvail, Secret-Key Reconciliation by Public Discussion, EUROCRYPT '93: Workshop on the theory and application of cryptographic techniques on Advances in cryptology, pp.410-423, 1994.
DOI : 10.1007/3-540-48285-7_35

J. Bringer and H. Chabanne, An Authentication Protocol with Encrypted Biometric Data, Lecture Notes in Computer Science, vol.5023, pp.109-124, 2008.
DOI : 10.1007/978-3-540-68164-9_8

J. Bringer, H. Chabanne, G. Cohen, and B. Kindarji, RFID key establishment against active adversaries, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS), 2009.
DOI : 10.1109/WIFS.2009.5386458

J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, and G. Zemor, Theoretical and practical boundaries of binary secure sketches. Information Forensics and Security, IEEE Transactions on, vol.3, issue.4, pp.673-683, 2008.
URL : https://hal.archives-ouvertes.fr/hal-00346970

J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, and G. Zémor, Optimal Iris Fuzzy Sketches, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems, 2007.
DOI : 10.1109/BTAS.2007.4401904

URL : https://hal.archives-ouvertes.fr/hal-00270547

J. Bringer, H. Chabanne, and T. Icart, Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function
DOI : 10.1007/978-3-540-85855-3_6

J. Bringer, H. Chabanne, T. A. Kevenaar, and B. Kindarji, Extending Match-On-Card to Local Biometric Identification, Biometric ID Management and Multimodal Communication, 2009.
DOI : 10.1007/3-540-44499-8_24

J. Bringer, H. Chabanne, and B. Kindarji, The best of both worlds: Applying secure sketches to cancelable biometrics, Science of Computer Programming, vol.74, issue.1-2, pp.43-51, 2008.
DOI : 10.1016/j.scico.2008.09.016

J. Bringer, H. Chabanne, and B. Kindarji, Anonymous identification with cancelable biometrics, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis, 2009.
DOI : 10.1109/ISPA.2009.5297678

J. Bringer, H. Chabanne, and B. Kindarji, Error-Tolerant Searchable Encryption, 2009 IEEE International Conference on Communications, pp.1-6, 2009.
DOI : 10.1109/ICC.2009.5199004

J. Bringer, H. Chabanne, and B. Kindarji, Identification with encrypted biometric data, Security and Communication Networks, vol.963, issue.11, 2010.
DOI : 10.1002/sec.206

URL : https://hal.archives-ouvertes.fr/hal-00872228

J. Bringer, H. Chabanne, G. Cohen, and B. Kindarji, Private Interrogation of Devices via Identification Codes, INDOCRYPT '09: Proceedings of the 10th International Conference on Cryptology in India, pp.272-289, 2009.
DOI : 10.1007/978-3-642-10628-6_19

J. Bringer, H. Chabanne, M. Izabachène, D. Pointcheval, Q. Tang et al., An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication, Lecture Notes in Computer Science, vol.4586, pp.96-106, 2007.
DOI : 10.1007/978-3-540-73458-1_8

J. Bringer, H. Chabanne, D. Pointcheval, and Q. Tang, Extended Private Information Retrieval and Its Application in Biometrics Authentications, Lecture Notes in Computer Science, vol.4856, pp.175-193, 2007.
DOI : 10.1007/978-3-540-76969-9_12

J. Bringer, H. Chabanne, D. Pointcheval, and S. Zimmer, An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication, Lecture Notes in Computer Science, vol.5312, pp.219-230, 2008.
DOI : 10.1007/978-3-540-89598-5_15

URL : https://hal.archives-ouvertes.fr/inria-00419151

J. Bringer, H. Chabanne, and Q. Tang, An Application of the Naccache-Stern Knapsack Cryptosystem to Biometric Authentication, 2007 IEEE Workshop on Automatic Identification Advanced Technologies, pp.180-185, 2007.
DOI : 10.1109/AUTOID.2007.380616

I. Buhan, J. Breebaart, J. Guajardo, E. Koen-de-groot, T. Kelkboom et al., A quantitative analysis of crossmatching resilience for a continuous-domain biometric encryption technique, First International Workshop on Signal Processing in the EncryptEd Domain, p.9, 2009.

I. Buhan, J. Doumen, P. Hartel, Q. Tang, and R. Veldhuis, Embedding Renewable Cryptographic Keys into Continuous Noisy Data, Information and Communications Security, pp.294-310, 2008.
DOI : 10.1109/18.333884

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.546.8751

I. Buhan, J. Doumen, P. Hartel, and R. Veldhuis, Fuzzy extractors for continuous distributions, Proceedings of the 2nd ACM symposium on Information, computer and communications security , ASIACCS '07, pp.353-355, 2007.
DOI : 10.1145/1229285.1229325

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.2298

J. W. Byun, D. H. Lee, and J. Lim, Efficient Conjunctive Keyword Search on Encrypted Data Storage System, EuroPKI, pp.184-196, 2006.
DOI : 10.1007/11774716_15

C. Cachin and U. M. Maurer, Linking information reconciliation and privacy amplification, Advances in Cryptology ? EURO- CRYPT'94, pp.266-274, 1995.
DOI : 10.1007/BFb0053442

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.3898

M. Cagalj, S. Capkun, R. Rengaswamy, I. Tsigkogiannis, M. Srivastava et al., Integrity (I) codes: message integrity protection and authentication over insecure channels, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.280-294, 2006.
DOI : 10.1109/SP.2006.23

S. Capkun, M. Cagalj, R. Rengaswamy, I. Tsigkogiannis, J. Hubaux et al., Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels, IEEE Transactions on Dependable and Secure Computing, vol.5, issue.4, pp.208-223, 2008.
DOI : 10.1109/TDSC.2008.11

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.389.7769

H. Chabanne, G. Cohen, and B. Kindarji, On iterated logarithm solutions to identification protocols, IEEE Information Theory Workshop 2010 (ITW 2010), 2010.
DOI : 10.1109/ITWKSPS.2010.5503130

H. Chabanne and G. Fumaroli, Noisy Cryptographic Protocols for Low-Cost RFID Tags, IEEE Transactions on Information Theory, vol.52, issue.8, pp.3562-3566, 2006.
DOI : 10.1109/TIT.2006.878219

URL : http://autoid.mit.edu/pickup/RFID_Papers/025.pdf

Y. Chang and M. Mitzenmacher, Privacy Preserving Keyword Searches on Remote Encrypted Data, Applied Cryptography and Network Security Conference (ACNS), 2005.
DOI : 10.1007/11496137_30

B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, Private information retrieval, Journal of the ACM, vol.45, issue.6, pp.965-981, 1998.
DOI : 10.1145/293347.293350

G. Cohen, H. G. Schaathun-reza-curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, Upper Bounds on Separating Codes, CCS '06: Proceedings of the 13th ACM conference on Computer and communications security, pp.1291-1294, 2004.
DOI : 10.1109/TIT.2004.828140

J. Daemen and V. Rijmen, The Design of Rijndael, 2002.
DOI : 10.1007/978-3-662-04722-4

J. Daugman, High confidence visual recognition of persons by a test of statistical independence, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.15, issue.11, pp.1148-1161, 1993.
DOI : 10.1109/34.244676

J. Daugman, The importance of being random: statistical principles of iris recognition, Pattern Recognition, vol.36, issue.2, pp.279-291, 2003.
DOI : 10.1016/S0031-3203(02)00030-4

G. I. Davida, Y. Frankel, and B. J. Matt, On enabling secure applications through off-line biometric identification, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186), p.148, 1998.
DOI : 10.1109/SECPRI.1998.674831

R. H. Deng, Y. Li, A. C. Yao, M. Yung, and Y. Zhao, A New Framework for RFID Privacy, Cryptology ePrint Archive, 2010.
DOI : 10.1007/978-3-642-15497-3_1

T. Dierks and E. Rescorla, The transport layer security (TLS) protocol version 1.1. RFC 4346, 2006.

Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, SIAM Journal on Computing, vol.38, issue.1, pp.97-139, 2008.
DOI : 10.1137/060651380

Y. Dodis and A. Smith, Correcting errors without leaking partial information, Proceedings of the thirty-seventh annual ACM symposium on Theory of computing , STOC '05, pp.654-663, 2005.
DOI : 10.1145/1060590.1060688

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.120.3846

V. Dorairaj, N. A. Schmid, and G. Fahmy, Performance evaluation of non-ideal iris based recognition system implementing global ICA encoding, IEEE International Conference on Image Processing 2005, pp.285-293, 2005.
DOI : 10.1109/ICIP.2005.1530384

C. Stark, A. Draper, E. Khisti, A. Martinian, J. S. Vetro et al., Secure storage of fingerprint biometrics using Slepian-Wolf codes, Information Theory and Applications Workshop, 2007.

C. Stark, A. Draper, E. Khisti, A. Martinian, J. S. Vetro et al., Using distributed source coding to secure fingerprint biometrics, 2007.

K. Eswaran, Identification via channels and constantweight codes

F. Farooq, R. M. Bolle, T. Jea, and N. Ratha, Anonymous and Revocable Fingerprint Recognition, 2007 IEEE Conference on Computer Vision and Pattern Recognition, 2007.
DOI : 10.1109/CVPR.2007.383382

L. Michael, J. Fredman, E. Komlós, and . Szemerédi, Storing a sparse table with O(1) worst case access time, p.31, 1984.

Y. Fregnac and M. Imbert, Development of neuronal selectivity in primary visual cortex of cat, Physiological Reviews, vol.64, issue.1, pp.325-434, 1984.

C. M. Benjamin, . Fung, M. Hussaeni, and . Cao, Preserving RFID data privacy, IEEE International Conference on RFID ? RFID 2009, 2009.

J. Martin, U. M. Gander, and . Maurer, On the secret-key rate of binary random variables, IEEE International Symposium on Information Theory, p.351, 1994.

I. William and . Gasarch, A survey on private information retrieval

C. Gentry and Z. Ramzan, Single-Database Private Information Retrieval with Constant Communication Rate, Lecture Notes in Computer Science, vol.3580, pp.803-815, 2005.
DOI : 10.1007/11523468_65

URL : http://cgis.cs.umd.edu/~gasarch/pir/logn.pdf

Y. Gertner, Y. Ishai, E. Kushilevitz, and T. Malkin, Protecting data privacy in private information retrieval schemes, Proceedings of the thirtieth annual ACM symposium on Theory of computing , STOC '98, pp.151-160, 1998.
DOI : 10.1145/276698.276723

P. Godlewski and G. Cohen, Some cryptographic aspects of womcodes In Lecture notes in computer sciences; 218 on Advances in cryptology?CRYPTO 85, pp.458-467, 1986.

A. Goh and D. Ling, Computation of Cryptographic Keys from Face Biometrics, Communications and Multimedia Security, pp.1-13, 2003.
DOI : 10.1007/978-1-4615-3198-2

J. Eu and . Goh, Secure indexes. Cryptology ePrint Archive, Report, vol.216216, 2003.

S. Goldwasser and S. Micali, Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984.
DOI : 10.1016/0022-0000(84)90070-9

URL : http://doi.org/10.1016/0022-0000(84)90070-9

V. Guruswami and M. Sudan, Improved decoding of Reed-Solomon and algebraic-geometry codes, IEEE Transactions on Information Theory, vol.45, issue.6, pp.1757-1767, 1999.
DOI : 10.1109/18.782097

V. Guruswami and M. Sudan, Reflections on " improved decoding of Reed-Solomon and algebraic-geometric codes, IEEE Information Theory Newsletter, 2002.

V. Guruswami and A. Vardy, Maximum-Likelihood Decoding of Reed???Solomon Codes is NP-Hard, SODA '05: Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms, pp.470-478, 2005.
DOI : 10.1109/TIT.2005.850102

G. Hachez, F. Koeune, and J. Quisquater, Biometrics, Access Control, Smart Cards: A Not So Simple Combination, Proceedings of the fourth working conference on smart card research and advanced applications on Smart card research and advanced applications, pp.273-288, 2001.
DOI : 10.1007/978-0-387-35528-3_16

M. Neil and . Haller, The S/KEY one-time password system, Proceedings of the Internet Society Symposium on Network and Distributed Systems, pp.151-157, 1994.

F. Hao, R. Anderson, and J. Daugman, Combining crypto with biometrics effectively, IEEE Transactions on Computers, vol.55, issue.9, pp.1081-1088, 2006.

F. Hao, J. Daugman, and P. Zielinski, A fast search algorithm for a large fuzzy database, IEEE Transactions on Information Forensics and Security, vol.3, issue.2, pp.203-212, 2008.

A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, Proactive Secret Sharing Or: How to Cope With Perpetual Leakage, pp.339-352, 1995.
DOI : 10.1007/3-540-44750-4_27

K. Hollingsworth, K. W. Bowyer, and P. J. Flynn, All Iris Code Bits are Not Created Equal, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems, 2007.
DOI : 10.1109/BTAS.2007.4401908

S. Hong, W. Jeon, S. Kim, D. Won, and C. Park, The Vulnerabilities Analysis of Fuzzy Vault Using Password, 2008 Second International Conference on Future Generation Communication and Networking, pp.76-83, 2008.
DOI : 10.1109/FGCN.2008.211

P. Indyk, Nearest Neighbors in High-Dimensional Spaces, Handbook of Discrete and Computational Geometry, chapter 39, 2004.
DOI : 10.1201/9781420035315.ch39

P. Indyk and R. Motwani, Approximate nearest neighbors, Proceedings of the thirtieth annual ACM symposium on Theory of computing , STOC '98, pp.604-613, 1998.
DOI : 10.1145/276698.276876

A. Teoh-beng-jin, D. N. , C. Ling, and A. Goh, An Integrated Dual Factor Authenticator Based on the Face Data and Tokenised Random Number, Lecture Notes in Computer Science, vol.3072, pp.117-123, 2004.
DOI : 10.1007/978-3-540-25948-0_17

A. Juels and M. Sudan, A fuzzy vault scheme. Designs, Codes and Cryptography, pp.237-257, 2006.
DOI : 10.1007/s10623-005-6343-z

A. Juels and M. Wattenberg, A fuzzy commitment scheme, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.28-36, 1999.
DOI : 10.1145/319709.319714

A. Juels and S. A. Weis, Defining strong privacy for RFID, PERCOMW, pp.342-347, 2007.

J. M. Kahn, H. Katz, and K. S. Pister, Emerging challenges: Mobile networking for “Smart Dust”, Journal of Communications and Networks, vol.2, issue.3, pp.188-196, 2000.
DOI : 10.1109/JCN.2000.6596708

J. Kaps, K. Yuksel, and B. Sunar, Energy Scalable Universal Hashing, IEEE Transactions on Computers, vol.54, issue.12, pp.1484-1495, 2005.
DOI : 10.1109/TC.2005.195

A. M. Tom, . Kevenaar, . Geert-jan-schrijen, A. H. Michiel-van-der-veen, F. Akkermans et al., Face recognition with renewable and privacy preserving binary templates, AUTOID '05: Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies, pp.21-26, 2005.

D. Khader, Public key encryption with keyword search based on K-resilient IBE, pp.298-308, 2006.

A. Kiayias and M. Yung, Polynomial Reconstruction Based Cryptography, Selected Areas in Cryptography, pp.129-133, 2001.
DOI : 10.1007/3-540-45537-X_10

A. Kiayias and M. Yung, Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes, International Colloquium on Automata, Languages and Programming, pp.232-243, 2002.
DOI : 10.1007/3-540-45465-9_21

A. Kiayias and M. Yung, Cryptographic hardness based on the decoding of Reed-Solomon codes with applications, Electronic Colloquium on Computational Complexity (ECCC), 2002.

A. Kiayias and M. Yung, Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2752-2769, 2008.
DOI : 10.1007/3-540-45465-9_21

A. Kirsch and M. Mitzenmacher, Distance-Sensitive Bloom Filters, Algorithm Engineering & Experiments, 2006.
DOI : 10.1137/1.9781611972863.4

A. Kong, K. Cheung, D. Zhang, M. Kamel, and J. You, An analysis of BioHashing and its variants, Pattern Recognition, vol.39, issue.7, pp.1359-1368, 2006.
DOI : 10.1016/j.patcog.2005.10.025

K. Kurosawa and T. Yoshida, Strongly universal hashing and identification codes via channels. Information Theory, IEEE Transactions on, vol.45, issue.6, pp.2091-2095, 1999.
DOI : 10.1109/18.782144

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.29.3933

E. Kushilevitz, R. Ostrovsky, and Y. Rabani, Efficient search for approximate nearest neighbor in high dimensional spaces, Symposium on the Theory Of Computing, pp.614-623, 1998.

Y. Lee, Y. Lee, Y. Chung, and K. Moon, One-Time Templates for Face Authentication, 2007 International Conference on Convergence Information Technology (ICCIT 2007), pp.1818-1823, 2007.
DOI : 10.1109/ICCIT.2007.372

. M. Jean-paul, P. Linnartz, and . Tuyls, New shielding functions to enhance privacy and prevent misuse of biometric templates, Audio-and Video-Based Biometric Person Authentication, pp.393-402, 2003.

H. Lipmaa, An Oblivious Transfer Protocol with Log-Squared Communication, pp.314-328, 2005.
DOI : 10.1007/11556992_23

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.8549

X. Liu, K. W. Bowyer, and P. J. Flynn, Iris recognition and verification experiments with improved segmentation method, AutoID'2005, 2005.

F. , J. Macwilliams, and N. J. Sloane, The Theory of Error- Correcting Codes (North-Holland Mathematical Library), 1983.

D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, and A. K. Jain, FVC2000: fingerprint verification competition, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.24, issue.3, pp.402-412, 2002.
DOI : 10.1109/34.990140

URL : http://biometrics.cse.msu.edu/Publications/Fingerprint/FVC/Maioetal_FVC2000_PAMI02.pdf

D. Maltoni, D. Maio, A. K. Jain, and S. Probhakar, Handbook of Fingerprint Recognition, 2003.
DOI : 10.1007/978-1-84882-254-2

A. Gregori and . Margulis, Probabilistic characteristics of graphs with large connectivity, Problemy Pereda?i Informacii, vol.10, issue.2, pp.101-108, 1974.

M. Ueli and . Maurer, Information-theoretically secure secret-key agreement by not authenticated public discussion, EUROCRYPT'97, 1997.

M. Ueli, S. Maurer, and . Wolf, Secret-key agreement over unauthenticated public channels II: the simulatability condition, IEEE Transactions on Information Theory, vol.49, issue.4, pp.832-838, 2003.

R. J. Mceliece, On the average list size for the Guruswami-Sudan decoder, ISCTA03, 2003.

J. L. Mnookin, The Achilles' heel of fingerprints. The Washington Post, 2004.

D. Molnar and D. Wagner, Privacy and security in library RFID, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.210-219, 2004.
DOI : 10.1145/1030083.1030112

P. Moulin and R. Koetter, A framework for the design of good watermark identification codes, Security, Steganography, and Watermarking of Multimedia Contents VIII, p.60721, 2006.
DOI : 10.1117/12.644642

D. E. Muller, Application of Boolean algebra to switching circuit design and to error detection, Transactions of the I.R.E. Professional Group on Electronic Computers, vol.3, issue.3, pp.6-12, 1954.
DOI : 10.1109/IREPGELC.1954.6499441

K. Nandakumar, A. Nagar, and A. K. Jain, Hardening Fingerprint Fuzzy Vault Using Password, In Advances in Biometrics Lecture Notes in Computer Science, vol.4642, pp.927-937, 2009.
DOI : 10.1007/978-3-540-74549-5_97

S. Newfield, Fingerprints don't lie, 1951.

C. Yu-ng, W. Susilo, Y. Mu, and R. Safavi-naini, RFID Privacy Models Revisited, Lecture Notes in Computer Science, vol.48, issue.9, pp.251-266, 2008.
DOI : 10.1145/1368310.1368351

M. Ohkubo, K. Suzuki, and S. Kinoshita, RFID privacy issues and technical challenges, Communications of the ACM, vol.48, issue.9, pp.66-71, 2005.
DOI : 10.1145/1081992.1082022

A. Orlitsky, Worst-case interactive communication. I. Two messages are almost optimal, IEEE Transactions on Information Theory, vol.36, issue.5, pp.1111-1126, 1990.
DOI : 10.1109/18.57210

A. Orlitsky, Worst-case interactive communication. II. Two messages are not optimal, IEEE Transactions on Information Theory, vol.37, issue.4, pp.995-1005, 1991.
DOI : 10.1109/18.86993

R. Ostrovsky, W. E. Skeith, and I. , Algebraic lower bounds for computing on encrypted data. Cryptology ePrint Archive, Report, vol.064, 2007.

R. Ostrovsky, W. E. Skeith, and I. , A survey of single database PIR: Techniques and applications. Cryptology ePrint Archive, Report, p.59, 2007.

R. Ostrovsky and V. Shoup, Private information storage (extended abstract), Proceedings of the twenty-ninth annual ACM symposium on Theory of computing , STOC '97, pp.294-303, 1997.
DOI : 10.1145/258533.258606

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.21.4287

K. Ouafi and R. Phan, Traceable Privacy of Recent Provably-Secure RFID Protocols, Proceedings of the 6th International Conference on Applied Cryptography and Network Security ? ACNS 2008, pp.479-489, 2008.
DOI : 10.1007/978-3-540-68914-0_29

P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Advances in Cryptology, Proceedings of EUROCRYPT '99, pp.223-238, 1999.
DOI : 10.1007/3-540-48910-X_16

S. Radu-ioan-paise and . Vaudenay, Mutual authentication in RFID: security and privacy, ASIACCS, pp.292-299, 2008.

F. King and . Pang, Communication complexity of computing the Hamming distance, SIAM Journal on Computing, vol.15, issue.4, pp.932-947, 1986.

Y. Pang, A. Teoh-beng-jin, and D. Ling, Two-Factor Cancelable Biometrics Authenticator, Journal of Computer Science and Technology, vol.12, issue.5, pp.54-59, 2007.
DOI : 10.1007/s11390-007-9006-x

P. , J. Phillips, H. Moon, P. Rauss, and S. A. Rizvi, The FERET evaluation methodology for face-recognition algorithms, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.22, issue.10, pp.1090-1104, 2000.

R. Plaga, On biometric keys, their information content and proper use, Conference on Biometric Feature Identification and Analysis, 2007.

K. Nalini, J. H. Ratha, R. M. Connell, and . Bolle, Enhancing security and privacy in biometrics-based authentication systems, IBM Systems Journal, vol.40, issue.3, pp.614-634, 2001.

K. Nalini, J. H. Ratha, R. M. Connell, S. Bolle, and . Chikkerur, Cancelable biometrics: A case study in fingerprints, International Conference on Pattern Recognition, pp.370-373, 2006.

N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, Generating Cancelable Fingerprint Templates, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.29, issue.4, pp.561-572, 2007.
DOI : 10.1109/TPAMI.2007.1004

I. S. Reed, A class of multiple-error-correcting codes and the decoding scheme, Transactions of the IRE Professional Group on Information Theory, vol.4, issue.4, pp.38-42, 1954.
DOI : 10.1109/TIT.1954.1057465

M. R. Rieback, Security and Privacy of Radio Frequency Identification, 2008.

R. L. Rivest, L. Adleman, and M. L. Dertouzos, On data banks and privacy homomorphisms, Foundations of Secure Computation, pp.169-177, 1978.

C. Roberts, Biometric attack vectors and defences, Computers & Security, vol.26, issue.1, pp.14-25, 2007.
DOI : 10.1016/j.cose.2006.12.008

A. Rudra, List Decoding and Property Testing of Error Correcting Codes, 2007.

E. Ryu and T. Takagi, Efficient conjunctive keywordsearchable encryption, AINA Workshops, pp.409-414, 2007.

A. Sadeghi, I. Visconti, and C. Wachsmann, User privacy in transport systems based on RFID e-tickets, Workshop on Privacy in Location-Based Applications ? PILBA'08, 2008.

A. Sahai and B. Waters, Fuzzy Identity-Based Encryption, Lecture Notes in Computer Science, vol.3494, pp.457-473, 2005.
DOI : 10.1007/11426639_27

M. Sandström, Liveness Detection in Fingerprint Recognition Systems, 2004.

B. Schoenmakers and P. Tuyls, Efficient Binary Conversion for Paillier Encrypted Values, pp.522-537, 2006.
DOI : 10.1007/11761679_31

J. Walter, T. E. Schreier, and . Boult, Cracking fuzzy vaults and biometric encryption, Proceedings of the Biometric Symposium, 2007.

S. Sedghi, J. M. Peter-van-liesdonk, P. H. Doumen, W. Hartel, and . Jonker, Adaptively secure computationally efficient searchable symmetric encryption, 2009.

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.
DOI : 10.1145/359168.359176

A. Shamir, Identity-Based Cryptosystems and Signature Schemes, Proceedings of CRYPTO 84 on Advances in cryptology, pp.47-53, 1985.
DOI : 10.1007/3-540-39568-7_5

C. E. Shannon, A mathematical theory of communication. The Bell System Technical Journal, pp.379-423, 1948.

C. E. Shannon, Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949.
DOI : 10.1002/j.1538-7305.1949.tb00928.x

V. Shoup, NTL: A library for doing number theory

K. Simoens, P. Tuyls, and B. Preneel, Privacy Weaknesses in Biometric Sketches, 2009 30th IEEE Symposium on Security and Privacy, pp.188-203, 2009.
DOI : 10.1109/SP.2009.24

S. Spiekermann and S. Evdokimov, Privacy Enhancing Technologies for RFID -A Critical Investigation of State of the Art Research, IEEE Privacy and Security, 2009.

S. Spielberg, Minority Report. DreamWorks, 20th Century Fox, 2002.

Z. Sun, T. Tan, X. Sutcu, S. Rane, J. S. Yedidia et al., Graph matching iris image blocks with local binary pattern Feature extraction for a slepian-wolf biometric system using LDPC codes, International Conference on Biometrics IEEE International Symposium on Information Theory, pp.366-372, 2006.

Y. Sutcu, S. Rane, J. S. Yedidia, C. Stark, A. Draper et al., Feature extraction for a Slepian-Wolf biometric system using LDPC codes, 2008 IEEE International Symposium on Information Theory, pp.2297-2301, 2008.
DOI : 10.1109/ISIT.2008.4595400

Y. Sutcu, S. Rane, J. S. Yedidia, C. Stark, A. Draper et al., Feature transformation of biometric templates for secure biometric systems based on error correcting codes, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, pp.1-6, 2008.
DOI : 10.1109/CVPRW.2008.4563111

Q. Tang, J. Bringer, H. Chabanne, and D. Pointcheval, A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes, Information Security Practice and Experience, pp.56-70, 2008.
DOI : 10.1007/978-3-540-79104-1_5

URL : https://hal.archives-ouvertes.fr/inria-00419156

R. M. Tanner, A recursive approach to low complexity codes, IEEE Transactions on Information Theory, vol.27, issue.5, pp.533-547, 1981.
DOI : 10.1109/TIT.1981.1056404

J. Tillich and G. Zémor, Discrete Isoperimetric Inequalities and the Probability of a Decoding Error, Combinatorics, Probability and Computing, vol.9, issue.5, pp.465-479, 2000.
DOI : 10.1017/S0963548300004466

P. Tuyls, A. H. Akkermans, T. A. Kevenaar, G. J. Schrijen, A. M. Bazen et al., Practical Biometric Authentication with Template Protection, AVBPA, pp.436-446, 2005.
DOI : 10.1007/11527923_45

P. Tuyls and J. Goseling, Capacity and examples of templateprotecting biometric authentication systems

Y. Ueshige and K. Sakurai, A proposal of one-time biometric authentication, Security and Management, pp.78-83, 2006.

U. Uludag and A. K. Jain, Attacks on biometric systems: a case study in fingerprints, Security, Steganography, and Watermarking of Multimedia Contents VI, 2004.
DOI : 10.1117/12.530907

U. Uludag and A. K. Jain, Fuzzy Vault for Fingerprints, 2004.
DOI : 10.1007/11527923_32

M. Upmanyu, A. M. Namboodiri, K. Srinathan, and C. V. Jawahar, Efficient Biometric Verification in Encrypted Domain, Lecture Notes in Computer Science, vol.5558, pp.899-908, 2009.
DOI : 10.1007/978-3-642-01793-3_91

S. Vaudenay, On Privacy Models for RFID, Lecture Notes in Computer Science, vol.4833, pp.68-87, 2007.
DOI : 10.1007/978-3-540-76900-2_5

E. Verbitskiy, P. Tuyls, C. Obi, B. Schoenmakers, and B. Skoric, Key extraction for general non-discrete signals, 2009.

S. Verdu, K. Victor, and . Wei, Explicit construction of optimal constant-weight codes for identification via channels. Information Theory, IEEE Transactions on, vol.39, issue.1, pp.30-36, 1993.

M. Weber, Frontal face dataset. http://www.vision.caltech. edu/html-files/archive, California Institute of Technology, 1999.

A. Stephen, S. E. Weis, R. L. Sarma, D. W. Rivest, and . Engels, Security and privacy aspects of low-cost radio frequency identification systems, Security in Pervasive Computing, pp.201-212, 2003.

N. Wiberg, Codes and Decoding on general Graphs, 1996.

C. Xing, Asymptotic bounds on frameproof codes Information Theory, IEEE Transactions on, vol.48, issue.11, pp.2991-2995, 2002.

K. Yuksel, Universal hashing for ultra-low-power cryptographic hardware applications, 2004.

G. Zémor, Threshold effects in codes, Algebraic Coding, pp.278-286, 1993.
DOI : 10.1007/3-540-57843-9_29