Extended private information retrieval and its application in biometrics authentications

被引:0
|
作者
Bringer, Julien
Chabanne, Herve
Pointcheval, David
Tang, Qiang
机构
来源
关键词
FUZZY EXTRACTORS; COMPUTATION;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper we generalize the concept of Private Information Retrieval (PIR) by formalizing a new cryptographic primitive, named Extended Private Information Retrieval (EPIR). Instead of enabling a user to retrieve a bit (or a block) from a database as in the case of PIR, an EPIR protocol enables a user to evaluate a function f which takes a string chosen by the user and a block from the database as input. Like PIR, EPIR can also be considered as a special case of the secure two-party computation problem (and more specifically the oblivious function evaluation problem). We propose two EPIR protocols, one for testing equality and the other for computing Hamming distance. As an important application, we show how to construct strong privacy-preserving biometric-based authentication schemes by employing these EPIR protocols.
引用
收藏
页码:175 / 193
页数:19
相关论文
共 50 条
  • [31] Noisy Private Information Retrieval: On Separability of Channel Coding and Information Retrieval
    Banawan, Karim
    Ulukus, Sennur
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (12) : 8232 - 8249
  • [32] On Single Server Private Information Retrieval With Private Coded Side Information
    Lu, Yuxiang
    Jafar, Syed A.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (05) : 3263 - 3284
  • [33] Private Information Retrieval with Private Side Information Under Storage Constraints
    Wei, Yi-Peng
    Ulukus, Sennur
    2018 IEEE INFORMATION THEORY WORKSHOP (ITW), 2018, : 345 - 349
  • [34] Revolutionary Information System Application in Biometrics
    Li, Yadan
    Xu, Xu
    2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 1, PROCEEDINGS, 2009, : 297 - +
  • [35] Multi-Message Private Information Retrieval with Private Side Information
    Shariatpanahi, Seyed Pooya
    Siavoshani, Mahdi Jafari
    Maddah-Ali, Mohammad Ali
    2018 IEEE INFORMATION THEORY WORKSHOP (ITW), 2018, : 335 - 339
  • [36] The Capacity of T-Private Information Retrieval With Private Side Information
    Chen, Zhen
    Wang, Zhiying
    Jafar, Syed Ali
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (08) : 4761 - 4773
  • [37] The Capacity of Private Information Retrieval With Partially Known Private Side Information
    Wei, Yi-Peng
    Banawan, Karim
    Ulukus, Sennur
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (12) : 8222 - 8231
  • [38] Share Conversion and Private Information Retrieval
    Beimel, Amos
    Ishai, Yuval
    Kushilevitz, Eyal
    Orlov, Ilan
    2012 IEEE 27TH ANNUAL CONFERENCE ON COMPUTATIONAL COMPLEXITY (CCC), 2012, : 258 - 268
  • [39] Vectorized Batch Private Information Retrieval
    Mughees, Muhammad Haris
    Ren, Ling
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 437 - 452
  • [40] Asymmetric Leaky Private Information Retrieval
    Samy, Islam
    Attia, Mohamed
    Tandon, Ravi
    Lazos, Loukas
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2021, 67 (08) : 5352 - 5369