Privacy-Preserving Fingercode Authentication

被引:0
|
作者
Barni, Mauro [1 ]
Bianchi, Tiziano
Catalano, Dario
Di Raimondo, Mario
Labati, Ruggero Donida
Failla, Pierluigi [1 ]
机构
[1] Univ Siena, Dipartimento Ingn Informaz, I-53100 Siena, Italy
关键词
FINGERPRINT; EFFICIENT;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We present a privacy preserving protocol for fingerprint-based authentication. We consider a scenario where a client equipped with a fingerprint reader is interested into learning if the acquired fingerprint belongs to the database of authorized entities managed by a server. For security, it is required that the client does not learn anything on the database and the server should not get any information about the requested biometry and the outcome of the matching process. The proposed protocol follows a multi-party computation approach and makes extensive use of homomorphic encryption as underlying cryptographic primitive. To keep the protocol complexity as low as possible, a particular representation of fingerprint images, named Fingercode, is adopted. Although the previous works on privacy-preserving biometric identification focus on selecting the best matching identity in the database, our main solution is a generic identification protocol and it allows to select and report all the enrolled identities whose distance to the user's fingercode is under a given threshold. Variants for simple authentication purposes are provided. Our protocols gain a notable bandwidth saving (about 25 - 39%) if compared with the best, previous work [1] and its computational complexity is still low and suitable for practical applications. Moreover, even if such protocols are presented in the context of a fingerprint-based system, they can be generalized to any biometric system that shares the same matching methodology, namely distance computation and thresholding.
引用
收藏
页码:231 / 240
页数:10
相关论文
共 50 条
  • [1] Privacy-Preserving Implicit Authentication
    Safa, Nashad Ahmed
    Safavi-Naini, Reihaneh
    Shahandashti, Siamak F.
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 471 - 484
  • [2] PRIVACY-PRESERVING AUTHENTICATION USING FINGERPRINT
    Feng, Quan
    Su, Fei
    Cai, Anni
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (11): : 8001 - 8018
  • [3] Efficient privacy-preserving implicit authentication
    Blanco-Justicia, Alberto
    Domingo-Ferrer, Josep
    [J]. COMPUTER COMMUNICATIONS, 2018, 125 : 13 - 23
  • [4] Privacy-preserving authentication using fingerprint
    [J]. Feng, Q. (fquan@sina.com), 1600, ICIC International (08):
  • [5] Robust Privacy-Preserving Fingerprint Authentication
    Zhang, Ye
    Koushanfar, Farinaz
    [J]. PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2016, : 1 - 6
  • [6] Practical Privacy-Preserving Authentication for SSH
    Roy, Lawrence
    Lyakhov, Stanislav
    Jang, Yeongjin
    Rosulek, Mike
    [J]. PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 3345 - 3362
  • [7] Privacy-preserving authentication of trees and graphs
    Ashish Kundu
    Elisa Bertino
    [J]. International Journal of Information Security, 2013, 12 : 467 - 494
  • [8] Privacy-preserving authentication of trees and graphs
    Kundu, Ashish
    Bertino, Elisa
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (06) : 467 - 494
  • [9] A privacy-preserving multifactor authentication system
    Acar, Abbas
    Liu, Wenyi
    Beyah, Raheem
    Akkaya, Kemal
    Uluagac, Arif Selcuk
    [J]. SECURITY AND PRIVACY, 2019, 2 (05):
  • [10] Privacy-Preserving Authentication Protocols in Vanet
    Nath H.J.
    Choudhury H.
    [J]. SN Computer Science, 4 (5)