Post-Quantum Biometric Authentication Based on Homomorphic Encryption and Classic McEliece

被引:1
|
作者
Arjona, Rosario [1 ]
Lopez-Gonzalez, Paula [1 ]
Roman, Roberto [1 ]
Baturone, Iluminada [1 ]
机构
[1] Univ Seville, Inst Microelect Sevilla IMSE CNM, CSIC, Seville 41092, Spain
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 02期
关键词
biometric template protection; homomorphic encryption; post-quantum security; TEMPLATE PROTECTION; SCHEME;
D O I
10.3390/app13020757
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Homomorphic encryption is a powerful mechanism that allows sensitive data, such as biometric data, to be compared in a protected way, revealing only the comparison result when the private key is known. This is very useful for non-device-centric authentication architectures with clients that provide protected data and external servers that authenticate them. While many reported solutions do not follow standards and are not resistant to quantum computer attacks, this work proposes a secure biometric authentication scheme that applies homomorphic encryption based on the Classic McEliece public-key encryption algorithm, which is a round 4 candidate of the NIST post-quantum standardization process. The scheme applies specific steps to transform the features extracted from biometric samples. Its use is proposed in a non-device-centric biometric authentication architecture that ensures user privacy. Irreversibility, revocability and unlinkability are satisfied and the scheme is robust to stolen-device, False-Acceptance Rate (FAR) and similarity-based attacks as well as to honest-but-curious servers. In addition to the security achieved by the McEliece system, which remains stable over 40 years of attacks, the proposal allows for very reduced storage and communication overheads as well as low computational cost. A practical implementation of a non-device-centric facial authentication system is illustrated based on the generation and comparison of protected FaceNet embeddings. Experimental results with public databases show that the proposed scheme improves the accuracy and the False-Acceptance Rate of the unprotected scheme, maintaining the False-Rejection Rate, allows real-time execution in clients and servers for Classic McEliece security parameter sets of 128 and 256 bits (mceliece348864 and mceliece6688128, respectively), and reduces storage requirements in more than 90.5% compared to the most reduced-size homomorphic encryption-based schemes with post-quantum security reported in the literature.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Homomorphic Encryption Based on Post-Quantum Cryptography
    Chen, Abel C. H.
    [J]. 2023 IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLIED NETWORK TECHNOLOGIES, ICMLANT, 2023, : 56 - 60
  • [2] Hardware Design and Implementation of Classic McEliece Post-Quantum Cryptosystem Based on FPGA
    Chen, Shaofen
    Lin, Haiyan
    Huang, Wenjin
    Huang, Yihua
    [J]. 2022 IEEE HIGH PERFORMANCE EXTREME COMPUTING VIRTUAL CONFERENCE (HPEC), 2022,
  • [3] A Distributed Biometric Authentication Protocol Based on Homomorphic Encryption
    Yao, Hailong
    Wang, Caifen
    Xu, Qinbai
    Li, Wenting
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (11): : 2375 - 2383
  • [4] Verifying Classic McEliece: Examining the Role of Formal Methods in Post-Quantum Cryptography Standardisation
    Brain, Martin
    Cid, Carlos
    Player, Rachel
    Robson, Wrenna
    [J]. CODE-BASED CRYPTOGRAPHY, CBCRYPTO 2022, 2023, 13839 : 21 - 36
  • [5] HLS-Based HW/SW Co-Design of the Post-Quantum Classic McEliece Cryptosystem
    Kostalabros, Vatistas
    Ribes-Gonzalez, Jordi
    Farras, Oriol
    Moreto, Miquel
    Hernandez, Carles
    [J]. 2021 31ST INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS (FPL 2021), 2021, : 52 - 59
  • [6] Exploring the RISC-V Vector Extension for the Classic McEliece Post-Quantum Cryptosystem
    Pircher, S.
    Geier, J.
    Zeh, A.
    Mueller-Gritschneder, D.
    [J]. PROCEEDINGS OF THE 2021 TWENTY SECOND INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2021), 2021, : 401 - 407
  • [7] Post-Quantum Authentication Schemes
    Mendiola, Mark A.
    Gillis, James T.
    Binder, Andrew J.
    Haddad, Ranwa
    [J]. PROCEEDINGS OF THE 33RD INTERNATIONAL TECHNICAL MEETING OF THE SATELLITE DIVISION OF THE INSTITUTE OF NAVIGATION (ION GNSS+ 2020), 2020, : 3812 - 3825
  • [8] Proposing a Secure e-Learning System Based on Biometric Authentication and Homomorphic Encryption
    Nita, Stefania Loredana
    Mihailescu, Marius Iulian
    [J]. ELEARNING CHALLENGES AND NEW HORIZONS, VOL 4, 2018, : 47 - 52
  • [9] Can We Use Biometric Authentication on Cloud?: Fingerprint Authentication Using Homomorphic Encryption
    Kim, Taeyun
    Kim, Hyoungshick
    [J]. PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 813 - 815
  • [10] New McEliece Cryptosystem Based on Polar Codes as a Candidate for Post-Quantum Cryptography
    Shrestha, Sujan Raj
    Kim, Young-Sik
    [J]. 2014 14TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES (ISCIT), 2014, : 368 - 372