Two-stage biometric identification systems without privacy leakage

被引:4
|
作者
Zhou L. [1 ]
Vu M.T. [1 ]
Oechtering T.J. [1 ]
Skoglund M. [1 ]
机构
[1] The Division of Information Science and Engineering, KTH Royal Institute of Technology, Stockholm
来源
IEEE Journal on Selected Areas in Information Theory | 2021年 / 2卷 / 01期
关键词
Biometric; Identification systems; Privacy; Secrecy;
D O I
10.1109/JSAIT.2021.3053368
中图分类号
学科分类号
摘要
We study two-stage biometric identification systems that allow authentication without privacy leakage. In the enrollment phase, secret keys and two layers of the helper data for each user are generated. Additional to the helper data and secret keys, we also introduce private keys in the systems. In the identification phase, an unknown but previously enrolled user is observed, and the user’s private key is also presented to the system. The system firstly compares the user with the first layer helper database, outputs a list, and obtains a set of user indices. Then the system compares the observed user with the users in the set. Therefore, the identification procedure avoids an exhaustive search and only has to do a comparison with some part of the users in the system, which leads to a systematic reduction of the search complexity. Fundamental trade-offs among the identification rate, the secret key rate, the private key rate, the helper data rate, and the list size rate are derived in the imposed two-stage biometric identification systems without privacy leakage. Moreover, the obtained results show that a private key can boost the identification rate and the secret key rate, as well as preserve privacy. © 2021 IEEE.
引用
收藏
页码:223 / 239
页数:16
相关论文
共 50 条
  • [1] Fundamental Limits for Biometric Identification Systems without Privacy Leakage
    Zhou, Linghui
    Minh Thanh Vu
    Oechtering, Tobias J.
    Skoglund, Mikael
    2019 57TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2019, : 1105 - 1112
  • [2] Privacy Leakage in Biometric Secrecy Systems
    Ignatenko, Tanya
    Willems, Frans M. J.
    2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3, 2008, : 850 - 857
  • [3] Towards Efficient Privacy-Preserving Two-Stage Identification for Fingerprint-based Biometric Cryptosystems
    Tams, Benjamin
    Rathgeb, Christian
    2014 IEEE/IAPR INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS (IJCB 2014), 2014,
  • [4] Secret Rate - Privacy Leakage in Biometric Systems
    Ignatenko, Tanya
    Willems, Frans
    2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, : 2251 - 2255
  • [5] PRIVACY-LEAKAGE CODES FOR BIOMETRIC AUTHENTICATION SYSTEMS
    Ignatenko, Tanya
    Willems, Frans M. J.
    2014 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2014,
  • [6] A Novel Two-Stage Identification of Unstable Systems
    Shahab, Mohammad
    Doraiswami, Rajamani
    2009 IEEE INTERNATIONAL CONFERENCE ON CONTROL AND AUTOMATION, VOLS 1-3, 2009, : 1043 - +
  • [7] Biometric identification systems in the Commonwealth and the right to privacy
    Sheckleford, Andre
    INTERNATIONAL DATA PRIVACY LAW, 2019, 9 (02) : 95 - 108
  • [8] TWO-STAGE CONVERTER WITH REDUCED LEAKAGE CURRENTS FOR TRANSFORMERLESS PHOTOVOLTAIC SYSTEMS
    Ferraz, Pedro E. P.
    Cavalcanti, Marcelo C.
    Bradaschia, Fabricio
    Azevedo, Gustavo M. S.
    Neves, Francisco A. S.
    2013 BRAZILIAN POWER ELECTRONICS CONFERENCE (COBEP), 2013, : 525 - 532
  • [9] A two-stage algorithm for identification of nonlinear dynamic systems
    Li, Kang
    Peng, Jian-Xun
    Bai, Er-Wei
    AUTOMATICA, 2006, 42 (07) : 1189 - 1197
  • [10] Two-Stage Voice Anonymization for Enhanced Privacy
    Nespoli, Francesco
    Barreda, Daniel
    Bitzer, Joeerg
    Naylor, Patrick A.
    INTERSPEECH 2023, 2023, : 3854 - 3858