SwePub
Sök i LIBRIS databas

  Extended search

L773:1611 3349 OR L773:0302 9743 OR L773:9783540433538
 

Search: L773:1611 3349 OR L773:0302 9743 OR L773:9783540433538 > (2015-2019) > Efficient Verifiabl...

Efficient Verifiable Computation of XOR for Biometric Authentication

Abidin, Aysajan, 1983 (author)
Katholieke Universiteit Leuven
Aly, Abdelrahaman (author)
Katholieke Universiteit Leuven
Rua, Enrique Argones (author)
Katholieke Universiteit Leuven
show more...
Mitrokotsa, Aikaterini, 1978 (author)
Chalmers tekniska högskola,Chalmers University of Technology
show less...
 (creator_code:org_t)
2016-10-28
2016
English.
In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). - Cham : Springer International Publishing. - 1611-3349 .- 0302-9743. ; 10052, s. 284-298
  • Conference paper (peer-reviewed)
Abstract Subject headings
Close  
  • This work addresses the security and privacy issues in remote biometric authentication by proposing an efficient mechanism to verify the correctness of the outsourced computation in such protocols. In particular, we propose an efficient verifiable computation of XORing encrypted messages using an XOR linear message authentication code (MAC) and we employ the proposed scheme to build a biometric authentication protocol. The proposed authentication protocol is both secure and privacy-preserving against malicious (as opposed to honest-but-curious) adversaries. Specifically, the use of the verifiable computation scheme together with an homomorphic encryption protects the privacy of biometric templates against malicious adversaries. Furthermore, in order to achieve unlinkability of authentication attempts, while keeping a low communication overhead, we show how to apply Oblivious RAM and biohashing to our protocol. We also provide a proof of security for the proposed solution. Our simulation results show that the proposed authentication protocol is efficient.

Subject headings

TEKNIK OCH TEKNOLOGIER  -- Elektroteknik och elektronik -- Annan elektroteknik och elektronik (hsv//swe)
ENGINEERING AND TECHNOLOGY  -- Electrical Engineering, Electronic Engineering, Information Engineering -- Other Electrical Engineering, Electronic Engineering, Information Engineering (hsv//eng)

Keyword

Template privacy and security
Universal hash functions
Homomorphic encryption
Verifiable computation
Biometric authentication

Publication and Content Type

kon (subject category)
ref (subject category)

Find in a library

To the university's database

Search outside SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view