Secure Fingerprint Authentication with Homomorphic Encryption

被引:7
|
作者
Yang, Wencheng [1 ]
Wang, Song [2 ]
Yu, Kan [3 ]
Kang, James Jin [3 ]
Johnstone, Michael N. [1 ]
机构
[1] Edith Cowan Univ, Secur Res Inst, Sch Sci, Cyber Secur Cooperat Res Ctr, Churchlands, WA 6027, Australia
[2] La Trobe Univ, Sch Engn & Math Sci, Bundoora, Vic 3086, Australia
[3] Edith Cowan Univ, Sch Sci, Churchlands, WA 6027, Australia
关键词
Fingerprint authentication; template protection; homomorphic encryption; biometrics;
D O I
10.1109/DICTA51227.2020.9363426
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Biometric-based authentication has come into recent prevalence in competition to traditional password- and/or token-based authentication in many applications, both for user convenience and the stability/uniqueness of biometric traits. However, biometric template data, uniquely linking to a user's identity, are considered to be sensitive information. Therefore, it should be secured to prevent privacy leakage. In this paper, we propose a homomorphic encryption-based fingerprint authentication system to provide access control, while protecting sensitive biometric template data. Using homomorphic encryption, matching of biometric data can be performed in the encrypted domain, increasing the difficulty for attackers to obtain the original biometric template without knowing the private key. Moreover, the trade-off between the computational overload and authentication accuracy is studied and experimentally verified on a publicly available fingerprint database, FVC2002 DB2.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Keeping embedded secure: Authentication and encryption
    Weng, W
    ELECTRONIC DESIGN, 2001, 49 (07) : 124 - +
  • [22] Secure Genomic String Search with Parallel Homomorphic Encryption
    Aziz, Md Momin Al
    Tamal, Md Toufique Morshed
    Mohammed, Noman
    INFORMATION, 2024, 15 (01)
  • [23] Secure matrix multiplication based on fully homomorphic encryption
    Huang, Hai
    Zong, Haoran
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (05): : 5064 - 5085
  • [24] Secure motion-copying via homomorphic encryption
    Takanashi, Haruki
    Teranishi, Kaoru
    Kogiso, Kiminao
    SICE JOURNAL OF CONTROL MEASUREMENT AND SYSTEM INTEGRATION, 2024, 17 (01) : 297 - 307
  • [25] Secure generalized Vickrey auction using homomorphic encryption
    Suzuki, K
    Yokoo, M
    FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2003, 2742 : 239 - 249
  • [26] Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption
    Katz, Jonathan
    Thiruvengadam, Aishwarya
    Zhou, Hong-Sheng
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 14 - 31
  • [27] Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation
    Barbosa, Manuel
    Farshim, Pooya
    TOPICS IN CRYPTOLOGY - CT-RSA 2012, 2012, 7178 : 296 - +
  • [28] A Secure Distributed Learning Framework Using Homomorphic Encryption
    Ly, Stephen
    Cheng, Yuan
    Chen, Haiquan
    Krovetz, Ted
    2023 20TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PST, 2023, : 258 - 266
  • [29] Secure Collapsing Method Based on Fully Homomorphic Encryption
    Niyitegeka, David
    Bellafqira, Reda
    Genin, Emmanuelle
    Coatrieux, Gouenou
    DIGITAL PERSONALIZED HEALTH AND MEDICINE, 2020, 270 : 412 - 416
  • [30] Homomorphic Encryption Based Secure Sensor Data Processing
    Gadepally, Vijay
    Isakov, Mihailo
    Agrawal, Rashmi
    Kepner, Jeremy
    Gettings, Karen
    Kinsy, Michel A.
    2020 IEEE HIGH PERFORMANCE EXTREME COMPUTING CONFERENCE (HPEC), 2020,