A Comparative Assessment of Homomorphic Encryption Algorithms Applied to Biometric Information

被引:1
|
作者
Crihan, Georgiana [1 ]
Craciun, Marian [1 ]
Dumitriu, Luminita [1 ]
机构
[1] Univ Galatzi, Fac Automat Comp Sci Elect & Elect Engn, Stiintei St 2, Galati 800210, Romania
关键词
security; Paillier algorithm; BGV algorithm; Arduino modules; encryption assessment;
D O I
10.3390/inventions8040102
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper provides preliminary research regarding the implementation and evaluation of a hybrid mechanism of authentication based on fingerprint recognition interconnected with RFID technology, using Arduino modules, that can be deployed in different scenarios, including secret classified networks. To improve security, increase efficiency, and enhance convenience in the process of authentication, we perform a comparative assessment between two homomorphic encryption algorithms, the Paillier partial homomorphic algorithm and the Brakerski-Gentry-Vaikuntanathan fully homomorphic encryption scheme, applied to biometric templates extracted from the device mentioned above, by analyzing factors such as a histogram analysis, mean squared error (MSE), peak signal-to-noise ratio (PSNR), the structural similarity index measure (SSIM), the number of pixel change rate (NPCR), the unified average changing intensity (UACI), the correlation coefficient, and average encryption time and dimension. From security and privacy perspectives, the present findings suggest that the designed mechanism represents a reliable and low-cost authentication alternative that can facilitate secure access to computer systems and networks and minimize the risk of unauthorized access.
引用
收藏
页数:16
相关论文
共 50 条
  • [41] Private pathological assessment via machine learning and homomorphic encryption
    Al Badawi, Ahmad
    Bin Yusof, Mohd Faizal
    BIODATA MINING, 2024, 17 (01):
  • [42] A Cancelable Biometric Security Framework Based on RNA Encryption and Genetic Algorithms
    Mohamed, Fatma A. Hossam Eldein
    El-Shafai, Walid
    Elkamchouchi, Hassan M. A.
    ELfahar, Adel
    Alarifi, Abdulaziz
    Amoon, Mohammed
    Aly, Moustafa H.
    Abd El-Samie, Fathi E.
    Singh, Aman
    Elshafee, Ahmed
    IEEE ACCESS, 2022, 10 : 55933 - 55957
  • [43] A Comparative Study of Secure Outsourced Matrix Multiplication Based on Homomorphic Encryption
    Babenko, Mikhail
    Golimblevskaia, Elena
    Tchernykh, Andrei
    Shiriaev, Egor
    Ermakova, Tatiana
    Pulido-Gaytan, Luis Bernardo
    Valuev, Georgii
    Avetisyan, Arutyun
    Gagloeva, Lana A.
    BIG DATA AND COGNITIVE COMPUTING, 2023, 7 (02)
  • [44] Simulation-Based Performance Validation of Homomorphic Encryption Algorithms in the Internet of Things
    Koelsch, Johannes
    Heinz, Christopher
    Ratzke, Axel
    Grimm, Christoph
    FUTURE INTERNET, 2019, 11 (10):
  • [45] Research on privacy information retrieval model based on hybrid homomorphic encryption
    Song, Wei-tao
    Zeng, Guang
    Zhang, Wen-zheng
    Tang, Dian-hua
    CYBERSECURITY, 2023, 6 (01)
  • [46] A Cancelable Biometric Security Framework Based on RNA Encryption and Genetic Algorithms
    Mohamed, Fatma A. Hossam Eldein
    El-Shafai, Walid
    Elkamchouchi, Hassan M. A.
    Elfahar, Adel
    Alarifi, Abdulaziz
    Amoon, Mohammed
    Aly, Moustafa H.
    El-Samie, Fathi E. Abd
    Singh, Aman
    Elshafee, Ahmed
    IEEE Access, 2022, 10 : 55933 - 55957
  • [47] A Public Key Compression Method for Fully Homomorphic Encryption using Genetic Algorithms
    Gavinho Filho, Joffre
    Silva, Gabriel P.
    Miceli, Claudio
    2016 19TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION), 2016, : 1991 - 1998
  • [48] Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms
    Hamza, Rafik
    Hassan, Alzubair
    Ali, Awad
    Bashir, Mohammed Bakri
    Alqhtani, Samar M.
    Tawfeeg, Tawfeeg Mohmmed
    Yousif, Adil
    ENTROPY, 2022, 24 (04)
  • [49] Research on privacy information retrieval model based on hybrid homomorphic encryption
    Wei-tao Song
    Guang Zeng
    Wen-zheng Zhang
    Dian-hua Tang
    Cybersecurity, 6
  • [50] An Efficient Fully Homomorphic Encryption Scheme for Private Information Retrieval in the Cloud
    Wang, Xun
    Luo, Tao
    Li, Jianfeng
    INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2020, 34 (04)