Secure Fingerprint Authentication with Homomorphic Encryption

被引:7
|
作者
Yang, Wencheng [1 ]
Wang, Song [2 ]
Yu, Kan [3 ]
Kang, James Jin [3 ]
Johnstone, Michael N. [1 ]
机构
[1] Edith Cowan Univ, Secur Res Inst, Sch Sci, Cyber Secur Cooperat Res Ctr, Churchlands, WA 6027, Australia
[2] La Trobe Univ, Sch Engn & Math Sci, Bundoora, Vic 3086, Australia
[3] Edith Cowan Univ, Sch Sci, Churchlands, WA 6027, Australia
关键词
Fingerprint authentication; template protection; homomorphic encryption; biometrics;
D O I
10.1109/DICTA51227.2020.9363426
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Biometric-based authentication has come into recent prevalence in competition to traditional password- and/or token-based authentication in many applications, both for user convenience and the stability/uniqueness of biometric traits. However, biometric template data, uniquely linking to a user's identity, are considered to be sensitive information. Therefore, it should be secured to prevent privacy leakage. In this paper, we propose a homomorphic encryption-based fingerprint authentication system to provide access control, while protecting sensitive biometric template data. Using homomorphic encryption, matching of biometric data can be performed in the encrypted domain, increasing the difficulty for attackers to obtain the original biometric template without knowing the private key. Moreover, the trade-off between the computational overload and authentication accuracy is studied and experimentally verified on a publicly available fingerprint database, FVC2002 DB2.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Can We Use Biometric Authentication on Cloud?: Fingerprint Authentication Using Homomorphic Encryption
    Kim, Taeyun
    Kim, Hyoungshick
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 813 - 815
  • [2] A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication
    Yang, Yijun
    Yu, Jianping
    Zhang, Peng
    Wang, Shulan
    COMPUTATIONAL AND MATHEMATICAL METHODS IN MEDICINE, 2015, 2015
  • [3] Secure and verifiable iris authentication system using fully homomorphic encryption
    Morampudi M.K.
    Prasad M.V.N.K.
    Verma M.
    Raju U.S.N.
    Computers and Electrical Engineering, 2021, 89
  • [4] A Secure Authentication Protocol for Cholesteric Spherical Reflectors Using Homomorphic Encryption
    Arenas, Monica P.
    Bingol, Muhammed Ali
    Demirci, Huseyin
    Fotiadis, Georgios
    Lenzini, Gabriele
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2022, 2022, 13503 : 425 - 447
  • [5] File Matching Based on Secure Authentication and Proxy Homomorphic Re-encryption
    Yu, Bin
    Zhang, Chen
    Li, Weihong
    ICMLC 2019: 2019 11TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING, 2019, : 472 - 476
  • [6] Proposing a Secure e-Learning System Based on Biometric Authentication and Homomorphic Encryption
    Nita, Stefania Loredana
    Mihailescu, Marius Iulian
    ELEARNING CHALLENGES AND NEW HORIZONS, VOL 4, 2018, : 47 - 52
  • [7] Chaotic Encryption for Fingerprint Authentication
    Aarthi, N. Ganitha
    Jeyaseelan, W. R. Salem
    Oviya, K.
    BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2019, 12 (02): : 70 - 75
  • [8] Circular Secure Homomorphic Encryption Scheme
    Zhao X.
    Fu Y.
    Song W.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (10): : 2117 - 2124
  • [9] HEDup: Secure Deduplication with Homomorphic Encryption
    Miguel, Rodel
    Aung, Khin Mi Mi
    Mediana
    PROCEEDINGS OF THE 2015 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS), 2015, : 215 - 223
  • [10] A Secure Processor Using Homomorphic Encryption
    Echandouri, Bouchra
    Gahi, Youssef
    Guennoun, Mouhcine
    Omary, Fouzia
    Networked Systems, NETYS 2016, 2016, 9944 : 376 - 376