A review of privacy-preserving biometric identification and authentication protocols

被引:0
作者
Zeng, Li [1 ,2 ,3 ]
Shen, Peisong [1 ,3 ]
Zhu, Xiaojie [4 ]
Tian, Xue [1 ,2 ,3 ]
Chen, Chi [1 ,2 ,3 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, 19 Shucun Rd, Beijing 100084, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, 1 Yanqihu East Rd, Beijing 100049, Peoples R China
[3] Key Lab Cyberspace Secur Def, 19 Shucun Rd, Beijing 100084, Peoples R China
[4] King Abdullah Univ Sci & Technol, Thuwal 239556900, Saudi Arabia
关键词
Biometrics; Biometric security; Privacy-preserving; Authentication; Identification; USER AUTHENTICATION; SECURE; SCHEME; EFFICIENT; PROTECTION; ATTACK;
D O I
10.1016/j.cose.2024.104309
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Biometrics now play a crucial role in user identification and authentication. However, storing biometric features in plaintext and conducting authentication without protection pose a risk of privacy leakage. To address this issue, privacy-preserving biometric identification and authentication protocols have been proposed. These protocols leverage techniques such as homomorphic encryption (HE) and secure multi-party computation (MPC) to prevent involving parties from knowing other parties' biometrics when performing authentications or identifications between different parties. In this paper, we present a thorough survey of privacy-preserving biometric protocols, classifying them into seven distinct models based on their application scenarios. In each scenario, we delve into its security requirements and potential threats, underscoring the importance of comprehending varied application scenarios in the design of practical biometric protection schemes. We also summarize current research gaps and potential future research directions, offering insights for advancing the field.
引用
收藏
页数:24
相关论文
共 152 条
  • [1] Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching
    Agrawal, Shashank
    Badrinarayanan, Saikrishna
    Mukherjee, Pratyay
    Rindal, Peter
    [J]. CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 1351 - 1370
  • [2] [Anonymous], 2015, Deep face recognition, DOI DOI 10.5244/C.27.8
  • [3] [Anonymous], 2002, Introduction to Cryptography: Principles and Applications
  • [4] [Anonymous], 2016, Official Journal of European Union, pL119
  • [5] Bai F, 2021, Arxiv, DOI arXiv:2105.02501
  • [6] SEMBA: secure multi-biometric authentication
    Bami, Mauro
    Droandi, Giulia
    Lazzeretti, Riccardo
    Pignata, Tommaso
    [J]. IET BIOMETRICS, 2019, 8 (06) : 411 - 421
  • [7] Barbosa M, 2008, LECT NOTES COMPUT SC, V5107, P21, DOI 10.1007/978-3-540-70500-0_3
  • [8] Barni M, 2010, MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, P231
  • [9] Fast and Accurate Likelihood Ratio-Based Biometric Verification Secure Against Malicious Adversaries
    Bassit, Amina
    Hahn, Florian
    Peeters, Joep
    Kevenaar, Tom
    Veldhuis, Raymond
    Peter, Andreas
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 5045 - 5060
  • [10] Privacy-Preserving Preselection for Protected Biometric Identification Using Public-Key Encryption With Keyword Search
    Bauspiess, Pia
    Kolberg, Jascha
    Drozdowski, Pawel
    Rathgeb, Christian
    Busch, Christoph
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (05) : 6972 - 6981