A Comparative Assessment of Homomorphic Encryption Algorithms Applied to Biometric Information

被引:1
|
作者
Crihan, Georgiana [1 ]
Craciun, Marian [1 ]
Dumitriu, Luminita [1 ]
机构
[1] Univ Galatzi, Fac Automat Comp Sci Elect & Elect Engn, Stiintei St 2, Galati 800210, Romania
关键词
security; Paillier algorithm; BGV algorithm; Arduino modules; encryption assessment;
D O I
10.3390/inventions8040102
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper provides preliminary research regarding the implementation and evaluation of a hybrid mechanism of authentication based on fingerprint recognition interconnected with RFID technology, using Arduino modules, that can be deployed in different scenarios, including secret classified networks. To improve security, increase efficiency, and enhance convenience in the process of authentication, we perform a comparative assessment between two homomorphic encryption algorithms, the Paillier partial homomorphic algorithm and the Brakerski-Gentry-Vaikuntanathan fully homomorphic encryption scheme, applied to biometric templates extracted from the device mentioned above, by analyzing factors such as a histogram analysis, mean squared error (MSE), peak signal-to-noise ratio (PSNR), the structural similarity index measure (SSIM), the number of pixel change rate (NPCR), the unified average changing intensity (UACI), the correlation coefficient, and average encryption time and dimension. From security and privacy perspectives, the present findings suggest that the designed mechanism represents a reliable and low-cost authentication alternative that can facilitate secure access to computer systems and networks and minimize the risk of unauthorized access.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] Securing multimodal biometric template using local random projection and homomorphic encryption
    Vallabhadas, Dilip Kumar
    Sandhya, Mulagala
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 70
  • [22] Customisation of Paillier Homomorphic Encryption for Efficient Binary Biometric Feature Vector Matching
    Penn, Georg M.
    Poetzelsberger, Gerhard
    Rohde, Martin
    Uhl, Andreas
    2014 INTERNATIONAL CONFERENCE OF THE BIOMETRICS SPECIAL INTEREST GROUP (BIOSIG), 2014,
  • [23] Biometric encryption: information privacy in a networked world
    Mytec Technologies Inc
    EDI Forum J Electron Commer, 3 (37-43):
  • [24] Homomorphic Encryption for Secure Information Retrieval from the Cloud
    Anand, V.
    Satapathy, Suresh Chandra
    FIRST INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, TECHNOLOGY AND SCIENCE - ICETETS 2016, 2016,
  • [25] Enhancing information lookup privacy through homomorphic encryption
    Fotiou, N.
    Trossen, D.
    Marias, G. F.
    Kostopoulos, A.
    Polyzos, G. C.
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2804 - 2814
  • [26] Homomorphic encryption approach for exploration of sensitive information retrieval
    Rauthan, J. S.
    Vaisla, K. S.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (05) : 6495 - 6505
  • [27] Efficient face information encryption and verification scheme based on full homomorphic encryption
    Chen, Yijia
    Duan, Fei
    Zhao, Yuhui
    Han, Tailin
    Hu, Jun
    Liu, Xuan
    Chen, Jialin
    Bai, Dong
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [28] Can We Use Biometric Authentication on Cloud?: Fingerprint Authentication Using Homomorphic Encryption
    Kim, Taeyun
    Kim, Hyoungshick
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 813 - 815
  • [29] THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system
    Karabat, Cagatay
    Kiraz, Mehmet Sabir
    Erdogan, Hakan
    Savas, Erkay
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2015,
  • [30] Secure and Privacy Preserving Method for Biometric Template Protection using Fully Homomorphic Encryption
    Jindal, Arun Kumar
    Shaik, Imtiyazuddin
    Vasudha, Vasudha
    Chalamala, Srinivasa Rao
    Rajan, M. A.
    Lodha, Sachin
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1128 - 1135