Efficient privacy-preserving face verification scheme

被引:7
|
作者
Huang, Hai [1 ]
Wang, Luyao [1 ]
机构
[1] Zhejiang Sci Tech Univ, Informat Sch, Hangzhou 310018, Peoples R China
关键词
Privacy-preserving computation; Face verification; Computation over encrypted data; Fully homomorphic encryption; Garbled circuit; HOMOMORPHIC ENCRYPTION; SECURE; AUTHENTICATION;
D O I
10.1016/j.jisa.2021.103055
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Face verification has been a promising artificial intelligence technique and is becoming increasingly popular in civilian and law enforcement applications that require reliable biometric authentication. However, the wide deployment of face verification systems has raised serious privacy concerns regarding the abuse of users' face images. In this paper, we present an efficient privacy-preserving face verification scheme based on fully homomorphic encryption and garbled circuit. Our protocol is the first one that guarantees that the server cannot learn anything about users' face images and the verification result while providing the face verification service, and the client learns nothing beyond the verification result. Experimental results show that our scheme takes less than one second to perform a privacy-preserving face verification.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] An Efficient Authentication Scheme for Privacy-Preserving in Secure Vehicular Communications
    Zhang, Hui
    Ma, Baihe
    Guo, Yao
    Liu, Zhihong
    Zeng, Yong
    2018 INTERNATIONAL CONFERENCE ON SENSOR NETWORKS AND SIGNAL PROCESSING (SNSP 2018), 2018, : 17 - 22
  • [42] An efficient and privacy-preserving query scheme in intelligent transportation systems
    Tang, Lele
    He, Mingxing
    Xiong, Ling
    Xiong, Neal
    Luo, Qian
    INFORMATION SCIENCES, 2023, 647
  • [43] EPcloak: An Efficient and Privacy-Preserving Spatial Cloaking Scheme for LBSs
    Niu, Ben
    Zhu, Xiaoyan
    Li, Weihao
    Li, Hui
    2014 IEEE 11TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2014, : 398 - 406
  • [44] FedSky: An Efficient and Privacy-Preserving Scheme for Federated Mobile Crowdsensing
    Zhang, Xichen
    Lu, Rongxing
    Shao, Jun
    Wang, Fengwei
    Zhu, Hui
    Ghorbani, Ali A.
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (07) : 5344 - 5356
  • [45] EPPS: Efficient Privacy-Preserving Scheme in Distributed Deep Learning
    Li, Yiran
    Li, Hongwei
    Xu, Guowen
    Liu, Sen
    Lu, Rongxing
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [46] Common Length Name Representation: An Efficient Privacy-Preserving Scheme
    Farah, Hanna
    Amyot, Daniel
    El Emam, Khaled
    2015 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON TECHNICAL AND LEGAL ASPECTS OF DATA PRIVACY AND SECURITY TELERISE 2015, 2015, : 44 - 49
  • [47] A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo Filter
    Li, Kang
    Lau, Wang Fat
    Au, Man Ho
    NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 615 - 631
  • [48] SAEV: Secure Aggregation and Efficient Verification for Privacy-Preserving Federated Learning
    Wang, Junkai
    Wang, Rong
    Xiong, Ling
    Xiong, Neal
    Liu, Zhicai
    IEEE Internet of Things Journal, 2024, 11 (24) : 39681 - 39696
  • [49] Privacy-preserving lightweight face recognition
    Li, Yuancheng
    Wang, Yimeng
    Li, Daoxing
    NEUROCOMPUTING, 2019, 363 : 212 - 222
  • [50] A scheme for privacy-preserving data dissemination
    Lilien, Leszek
    Bharuava, Bharat
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2006, 36 (03): : 502 - 506