Efficient privacy-preserving face recognition

作者: Ahmad-Reza Sadeghi , Thomas Schneider , Immo Wehrenberg

DOI: 10.1007/978-3-642-14423-3_16

关键词: CryptographyComputer scienceFacial recognition systemGigabit EthernetComputer securityFace (geometry)Homomorphic encryptionEncryptionCommunication complexitySecure two-party computation

摘要: … privacy-preserving face recognition concerns a client who privately searches for a specific face image in the face … In this paper we present a privacy-preserving face recognition scheme …

参考文章(31)
Yuval Ishai, Joe Kilian, Kobbi Nissim, Erez Petrank, Extending Oblivious Transfers Efficiently Advances in Cryptology - CRYPTO 2003. pp. 145- 161 ,(2003) , 10.1007/978-3-540-45146-4_9
Zekeriya Erkin, Martin Franz, Jorge Guajardo, Stefan Katzenbeisser, Inald Lagendijk, Tomas Toft, None, Privacy-Preserving Face Recognition privacy enhancing technologies. pp. 235- 253 ,(2009) , 10.1007/978-3-642-03168-7_14
Noam Nisan, Benny Pinkas, Yaron Sella, Dahlia Malkhi, Fairplay—a secure two-party computation system usenix security symposium. pp. 20- 20 ,(2004)
Helger Lipmaa, Verifiable Homomorphic Oblivious Transfer and Private Equality Test international conference on the theory and application of cryptology and information security. pp. 416- 433 ,(2003) , 10.1007/978-3-540-40061-5_27
Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider, Practical Secure Evaluation of Semi-private Functions Applied Cryptography and Network Security. pp. 89- 106 ,(2009) , 10.1007/978-3-642-01957-9_6
Bill Aiello, Yuval Ishai, Omer Reingold, Priced Oblivious Transfer: How to Sell Digital Goods Lecture Notes in Computer Science. pp. 119- 135 ,(2001) , 10.1007/3-540-44987-6_8
Marc Fischlin, A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires the cryptographers track at the rsa conference. pp. 457- 472 ,(2001) , 10.1007/3-540-45353-9_33
Benny Pinkas, Thomas Schneider, Nigel P. Smart, Stephen C. Williams, Secure Two-Party Computation Is Practical international conference on the theory and application of cryptology and information security. pp. 250- 267 ,(2009) , 10.1007/978-3-642-10366-7_15
Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider, Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima cryptology and network security. ,vol. 5888, pp. 1- 20 ,(2009) , 10.1007/978-3-642-10433-6_1