Corpus ID: 57760611

Instant Privacy-Preserving Biometric Authentication for Hamming Distance

@article{Lee2018InstantPB,
  title={Instant Privacy-Preserving Biometric Authentication for Hamming Distance},
  author={Joohee Lee and Dongwook Kim and Duhyeong Kim and Yongsoo Song and Junbum Shin and Jung Hee Cheon},
  journal={IACR Cryptol. ePrint Arch.},
  year={2018},
  volume={2018},
  pages={1214}
}
In recent years, there has been enormous research attention in privacy-preserving biometric authentication, which enables a user to verify him or herself to a server without disclosing raw biometric information. Since biometrics is irrevocable when exposed, it is very important to protect its privacy. In IEEE TIFS 2018, Zhou and Ren proposed a privacy-preserving user-centric biometric authentication scheme named PassBio, where the end-users encrypt their own templates, and the authentication… Expand
Privacy-preserving and verifiable multi-instance iris remote authentication using public auditor
TLDR
This work proposes a privacy-preserving and verifiable multi-instance iris authentication using public auditor (PviaPA), and demonstrates that PviaPA provides privacy to the iris templates with no loss in the accuracy as well as trust on the comparator result. Expand
Acceleration of Inner-Pairing Product Operation for Secure Biometric Verification †
TLDR
This paper proposes an enhanced method to accelerate the inner-pairing product computation and apply it to expedite the decryption operation of FE and for faster remote biometric verification and reduces the time required to compute an inner- Pairing product by 30.7%, compared to the previous best method. Expand
PBio: Enabling Cross-organizational Biometric Authentication Service through Secure Sharing of Biometric Templates
TLDR
The core component of PBio is a new protocol comprising distance recoverable encryption and secure distance computation, which minimizes the risk of template reconstruction in the event that the encrypted partial database is recovered due to leak of the encryption key. Expand
BMIAE: blockchain-based multi-instance Iris authentication using additive ElGamal homomorphic encryption
TLDR
Experimental results show that BMIAE provides improved accuracy, and eliminates the need to trust the centralised server when compared to the state-of-the-art approaches. Expand
Secure Record Linkage of Large Health Data Sets: Evaluation of a Hybrid Cloud Model
TLDR
The result of an experimental evaluation shows the operational feasibility of such a model and the exciting opportunities for advancing the analysis of linkage outputs. Expand

References

SHOWING 1-10 OF 64 REFERENCES
Security aspects of privacy-preserving biometric authentication based on ideal lattices and ring-LWE
TLDR
A simple attack algorithm is presented that enables a malicious computation server to learn the biometric templates in at most 2N-τ queries, where N is the bit-length of a biometric template and τ the authentication threshold. Expand
PassBio: Privacy-Preserving User-Centric Biometric Authentication
  • Kai Zhou, Jian Ren
  • Computer Science
  • IEEE Transactions on Information Forensics and Security
  • 2018
TLDR
This paper proposes a user-centric biometric authentication scheme (PassBio) that enables end-users to encrypt their own templates with the proposed light-weighted encryption scheme, and shows that TPE can be utilized as a flexible building block to evaluate different distance metrics, such as Hamming distance and Euclidean distance over encrypted data. Expand
THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system
TLDR
The THRIVE system is suitable for applications where the user does not want to reveal her biometrics to the verifier in plain form, but needs to prove her identity by using biometric data, and is proven secure in the malicious model. Expand
Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics
TLDR
This paper proposes an efficient method to compute the Hamming distance on encrypted data using the homomorphic encryption based on ideal lattices, and proposes a privacy-preserving biometric authentication protocol using this method, and compares it with related protocols. Expand
Privacy-preserving fingercode authentication
TLDR
The main solution is a generic identification protocol that allows to select and report all the enrolled identities whose distance to the user's fingercode is under a given threshold and can be generalized to any biometric system that shares the same matching methodology, namely distance computation and thresholding. Expand
Outsourceable two-party privacy-preserving biometric authentication
TLDR
This paper proposes a two-party PPBA protocol when the biometric data in consideration are fully encrypted and outsourced to a cloud, and formally analyze the security of the proposed protocol and provides extensive empirical results to show its runtime complexity. Expand
Efficient Verifiable Computation of XOR for Biometric Authentication
TLDR
This work proposes an efficient verifiable computation of XORing encrypted messages using an XOR linear message authentication code (MAC) and employs the proposed scheme to build a biometric authentication protocol that is both secure and privacy-preserving against malicious adversaries. Expand
Secure and Efficient Protocols for Iris and Fingerprint Identification
TLDR
This work develops and implements the first privacy-preserving identification protocol for iris codes and designs and implements a secure protocol for fingerprint identification based on FingerCodes with a substantial improvement in the performance compared to existing solutions. Expand
Privacy-Preserving Face Recognition
TLDR
This paper proposes for the first time a strongly privacy-enhanced face recognition system, which allows to efficiently hide both the biometrics and the result from the server that performs the matching operation, by using techniques from secure multiparty computation. Expand
Cancelable iris biometrics and using Error Correcting Codes to reduce variability in biometric data
TLDR
A two factor scheme to generate cancelable iris templates using iris-biometric and password is proposed and a novel way to use error correcting codes (ECC) to reduce the variabilities in biometric data. Expand
...
1
2
3
4
5
...