Secure and Efficient Protocols for Iris and Fingerprint Identification

作者: Marina Blanton , Paolo Gasti

DOI: 10.1007/978-3-642-23822-2_11

关键词:

摘要: Recent advances in biometric recognition and the increasing use of data prompt significant privacy challenges associated with possible misuse, loss, or theft data. Biometric matching is often performed by two mutually distrustful parties, one which holds image while other owns a possibly large collection. Due to liability considerations, neither party willing share its This gives rise need develop secure computation techniques over where no information revealed parties except outcome comparison search. To address problem, this work we implement first privacy-preserving identification protocol for iris codes. We also design fingerprint based on FingerCodes substantial improvement performance compared existing solutions. show that new optimizations employed allow us achieve particularly efficient protocols suitable sets obtain notable gain state-of-the-art prior work.

参考文章(40)
Noam Nisan, Benny Pinkas, Yaron Sella, Dahlia Malkhi, Fairplay - Secure Two-Party Computation System (Awarded Best Student Paper!) usenix security symposium. ,(2004)
Yuval Ishai, Joe Kilian, Kobbi Nissim, Erez Petrank, Extending Oblivious Transfers Efficiently Advances in Cryptology - CRYPTO 2003. pp. 145- 161 ,(2003) , 10.1007/978-3-540-45146-4_9
Zekeriya Erkin, Martin Franz, Jorge Guajardo, Stefan Katzenbeisser, Inald Lagendijk, Tomas Toft, None, Privacy-Preserving Face Recognition privacy enhancing technologies. pp. 235- 253 ,(2009) , 10.1007/978-3-642-03168-7_14
Noam Nisan, Benny Pinkas, Yaron Sella, Dahlia Malkhi, Fairplay—a secure two-party computation system usenix security symposium. pp. 20- 20 ,(2004)
Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg, Efficient privacy-preserving face recognition international conference on information security and cryptology. pp. 229- 244 ,(2009) , 10.1007/978-3-642-14423-3_16
Keith Frikken, Privacy-Preserving Set Union Applied Cryptography and Network Security. pp. 237- 252 ,(2007) , 10.1007/978-3-540-72738-5_16
Yehuda Lindell, Benny Pinkas, Nigel P Smart, None, Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries security and cryptography for networks. pp. 2- 20 ,(2008) , 10.1007/978-3-540-85855-3_2
Octavian Catrina, Amitabh Saxena, Secure computation with fixed-point numbers financial cryptography. ,vol. 6052, pp. 35- 50 ,(2010) , 10.1007/978-3-642-14577-3_6
Benny Pinkas, Thomas Schneider, Nigel P. Smart, Stephen C. Williams, Secure Two-Party Computation Is Practical international conference on the theory and application of cryptology and information security. pp. 250- 267 ,(2009) , 10.1007/978-3-642-10366-7_15
Julien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang, Sébastien Zimmer, An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication Information Security and Privacy. pp. 96- 106 ,(2007) , 10.1007/978-3-540-73458-1_8