Secure Fingerprint Authentication with Homomorphic Encryption

被引:7
|
作者
Yang, Wencheng [1 ]
Wang, Song [2 ]
Yu, Kan [3 ]
Kang, James Jin [3 ]
Johnstone, Michael N. [1 ]
机构
[1] Edith Cowan Univ, Secur Res Inst, Sch Sci, Cyber Secur Cooperat Res Ctr, Churchlands, WA 6027, Australia
[2] La Trobe Univ, Sch Engn & Math Sci, Bundoora, Vic 3086, Australia
[3] Edith Cowan Univ, Sch Sci, Churchlands, WA 6027, Australia
关键词
Fingerprint authentication; template protection; homomorphic encryption; biometrics;
D O I
10.1109/DICTA51227.2020.9363426
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Biometric-based authentication has come into recent prevalence in competition to traditional password- and/or token-based authentication in many applications, both for user convenience and the stability/uniqueness of biometric traits. However, biometric template data, uniquely linking to a user's identity, are considered to be sensitive information. Therefore, it should be secured to prevent privacy leakage. In this paper, we propose a homomorphic encryption-based fingerprint authentication system to provide access control, while protecting sensitive biometric template data. Using homomorphic encryption, matching of biometric data can be performed in the encrypted domain, increasing the difficulty for attackers to obtain the original biometric template without knowing the private key. Moreover, the trade-off between the computational overload and authentication accuracy is studied and experimentally verified on a publicly available fingerprint database, FVC2002 DB2.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Secure Decentralized Image Classification With Multiparty Homomorphic Encryption
    Xu, Guowen
    Li, Guanlin
    Guo, Shangwei
    Zhang, Tianwei
    Li, Hongwei
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2023, 33 (07) : 3185 - 3198
  • [32] Secure Teleoperation Control Using Somewhat Homomorphic Encryption
    Kosieradzki, Shane
    Zhao, Xiaofeng
    Kawase, Hiroaki
    Qiu, Yingxin
    Kogiso, Kiminao
    Ueda, Jun
    IFAC PAPERSONLINE, 2022, 55 (37): : 593 - 600
  • [33] Challenges of Using Homomorphic Encryption to Secure Cloud Computing
    El Makkaoui, Khalid
    Ezzati, Abdellah
    Beni Hssane, Abderrahim
    2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 343 - 349
  • [34] Secure Signal Processing Using Fully Homomorphic Encryption
    Shortell, Thomas
    Shokoufandeh, Ali
    ADVANCED CONCEPTS FOR INTELLIGENT VISION SYSTEMS, ACIVS 2015, 2015, 9386 : 93 - 104
  • [35] Performance of Secure Network Coding based on Homomorphic Encryption
    Choi, Seong-Min
    Park, Joon-Sang
    2016 EIGHTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2016, : 670 - 672
  • [36] Secure signal processing using fully homomorphic encryption
    Shortell, Thomas
    Shokoufandeh, Ali
    IET INFORMATION SECURITY, 2020, 14 (01) : 51 - 59
  • [37] Secure matrix multiplication based on fully homomorphic encryption
    Hai Huang
    Haoran Zong
    The Journal of Supercomputing, 2023, 79 : 5064 - 5085
  • [38] SoK: Towards CCA Secure Fully Homomorphic Encryption
    Okada, Hiroki
    Fukushima, Kazuhide
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 793 - 798
  • [39] Secure Relative Detection in (Forensic) Database with Homomorphic Encryption
    Chen, Jingwei
    Miao, Weijie
    Wu, Wenyuan
    Yang, Linhan
    Yuan, Haonan
    BIOINFORMATICS RESEARCH AND APPLICATIONS, PT II, ISBRA 2024, 2024, 14955 : 410 - 422
  • [40] A Secure Database System using Homomorphic Encryption Schemes
    Gahi, Youssef
    Guennoun, Mouhcine
    El-Khatib, Khalil
    DBKDA 2011: THE THIRD INTERNATIONAL CONFERENCE ON ADVANCES IN DATABASES, KNOWLEDGE, AND DATA APPLICATIONS, 2011, : 54 - 58