Secure Fingerprint Authentication with Homomorphic Encryption

被引:7
|
作者
Yang, Wencheng [1 ]
Wang, Song [2 ]
Yu, Kan [3 ]
Kang, James Jin [3 ]
Johnstone, Michael N. [1 ]
机构
[1] Edith Cowan Univ, Secur Res Inst, Sch Sci, Cyber Secur Cooperat Res Ctr, Churchlands, WA 6027, Australia
[2] La Trobe Univ, Sch Engn & Math Sci, Bundoora, Vic 3086, Australia
[3] Edith Cowan Univ, Sch Sci, Churchlands, WA 6027, Australia
关键词
Fingerprint authentication; template protection; homomorphic encryption; biometrics;
D O I
10.1109/DICTA51227.2020.9363426
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Biometric-based authentication has come into recent prevalence in competition to traditional password- and/or token-based authentication in many applications, both for user convenience and the stability/uniqueness of biometric traits. However, biometric template data, uniquely linking to a user's identity, are considered to be sensitive information. Therefore, it should be secured to prevent privacy leakage. In this paper, we propose a homomorphic encryption-based fingerprint authentication system to provide access control, while protecting sensitive biometric template data. Using homomorphic encryption, matching of biometric data can be performed in the encrypted domain, increasing the difficulty for attackers to obtain the original biometric template without knowing the private key. Moreover, the trade-off between the computational overload and authentication accuracy is studied and experimentally verified on a publicly available fingerprint database, FVC2002 DB2.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Secure Multiple Linear Regression Based on Homomorphic Encryption
    Hall, Rob
    Fienberg, Stephen E.
    Nardi, Yuval
    JOURNAL OF OFFICIAL STATISTICS, 2011, 27 (04) : 669 - 691
  • [42] Secure Outsourced Matrix Multiplication with Fully Homomorphic Encryption
    Zhu, Lin
    Hua, Qiang-sheng
    Chen, Yi
    Jin, Hai
    COMPUTER SECURITY - ESORICS 2023, PT I, 2024, 14344 : 249 - 269
  • [43] Implementing homomorphic encryption based secure feedback control
    Tran, Julian
    Farokhi, Farhad
    Cantoni, Michael
    Shames, Iman
    CONTROL ENGINEERING PRACTICE, 2020, 97
  • [44] Optimizing Homomorphic Encryption based Secure Image Analytics
    Jain, Nayna
    Nandakumar, Karthik
    Ratha, Nalini
    Pankanti, Sharath
    Kumar, Uttam
    IEEE MMSP 2021: 2021 IEEE 23RD INTERNATIONAL WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING (MMSP), 2021,
  • [45] Scalable and Secure Logistic Regression via Homomorphic Encryption
    Aono, Yoshinori
    Hayashi, Takuya
    Le Trieu Phong
    Wang, Lihua
    CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, : 142 - 144
  • [46] Homomorphic Encryption for Secure Information Retrieval from the Cloud
    Anand, V.
    Satapathy, Suresh Chandra
    FIRST INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, TECHNOLOGY AND SCIENCE - ICETETS 2016, 2016,
  • [47] Secure Similarity Joins Using Fully Homomorphic Encryption
    Cruz, Mateus S. H.
    Amagasa, Toshiyuki
    Watanabe, Chiemi
    Lu, Wenjie
    Kitagawa, Hiroyuki
    19TH INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES (IIWAS2017), 2017, : 224 - 233
  • [48] Chosen-Ciphertext Secure Fully Homomorphic Encryption
    Canetti, Ran
    Raghuraman, Srinivasan
    Richelson, Silas
    Vaikuntanathan, Vinod
    PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT II, 2017, 10175 : 213 - 240
  • [49] Application of a circular secure variant of LWE in the homomorphic encryption
    Yang, Xiaoyuan
    Zhou, Tanping
    Zhang, Wei
    Wu, Liqiang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (06): : 1389 - 1393
  • [50] Secure Control Using Homomorphic Encryption and Efficiency Analysis
    Pan J.
    Sui T.
    Liu W.
    Wang J.
    Kong L.
    Zhao Y.
    Security and Communication Networks, 2023, 2023