Privacy-Preserving Biometric Identification Using Secure Multiparty Computation

被引:95
作者
Bringer, Julien
Chabanne, Herve
Patey, Alain
机构
[1] Morpho (SAFRAN Group)
[2] Télécom ParisTech, Paris
关键词
Privacy-preserving techniques - Anthropometry;
D O I
10.1109/MSP.2012.2230218
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This article presents a tutorial overview of the application of techniques of secure two-party computation (also known as secure function evaluation) to biometric identification. These techniques enable to compute biometric identification algorithms while maintaining the privacy of the biometric data. This overview considers the main tools of secure two-party computations such as homomorphic encryption, garbled circuits (GCs), and oblivious transfers (OTs) and intends to give clues on the best practices to secure a biometric identification protocol. It also presents recent trends in privacy-preserving biometric identification that aim at making it usable in real-life applications. © 1991-2012 IEEE.
引用
收藏
页码:42 / 52
页数:11
相关论文
共 30 条
  • [1] [Anonymous], 2011, P NETW DISTR SYST SE
  • [2] BARNI M, 2010, P 12 ACM WORKSH MULT, P231
  • [3] Blanton M, 2011, LECT NOTES COMPUT SC, V6879, P190, DOI 10.1007/978-3-642-23822-2_11
  • [4] Bogetoft P, 2009, LECT NOTES COMPUT SC, V5628, P325, DOI 10.1007/978-3-642-03549-4_20
  • [5] Bringer J., 2012, 2012 5th IAPR International Conference on Biometrics (ICB), P257, DOI 10.1109/ICB.2012.6199817
  • [6] Bringer J., P 4 IEEE INT C BIOM
  • [7] How iris recognition works
    Daugman, J
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2004, 14 (01) : 21 - 30
  • [8] Erkin Z, 2009, LECT NOTES COMPUT SC, V5672, P235, DOI 10.1007/978-3-642-03168-7_14
  • [9] Fully Homomorphic Encryption Using Ideal Lattices
    Gentry, Craig
    [J]. STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, : 169 - 178
  • [10] Hazay C, 2010, INFORM SEC CRYPT TEX, P3, DOI 10.1007/978-3-642-14303-8