Efficient privacy-preserving face verification scheme

被引:9
作者
Huang, Hai [1 ]
Wang, Luyao [1 ]
机构
[1] Zhejiang Sci Tech Univ, Informat Sch, Hangzhou 310018, Peoples R China
关键词
Privacy-preserving computation; Face verification; Computation over encrypted data; Fully homomorphic encryption; Garbled circuit; HOMOMORPHIC ENCRYPTION; SECURE; AUTHENTICATION;
D O I
10.1016/j.jisa.2021.103055
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Face verification has been a promising artificial intelligence technique and is becoming increasingly popular in civilian and law enforcement applications that require reliable biometric authentication. However, the wide deployment of face verification systems has raised serious privacy concerns regarding the abuse of users' face images. In this paper, we present an efficient privacy-preserving face verification scheme based on fully homomorphic encryption and garbled circuit. Our protocol is the first one that guarantees that the server cannot learn anything about users' face images and the verification result while providing the face verification service, and the client learns nothing beyond the verification result. Experimental results show that our scheme takes less than one second to perform a privacy-preserving face verification.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] An efficient privacy-preserving data query and dissemination scheme in vehicular cloud
    Hu, Peng
    Wang, Yongli
    Xiao, Gang
    Zhou, Junlong
    Gong, Bei
    Wang, Yongjian
    PERVASIVE AND MOBILE COMPUTING, 2020, 65
  • [32] An Efficient and Privacy-Preserving Scheme for Disease Prediction in Modern Healthcare Systems
    Gopalan, Shynu Padinjappurathu
    Chowdhary, Chiranji Lal
    Iwendi, Celestine
    Farid, Muhammad Awais
    Ramasamy, Lakshmana Kumar
    SENSORS, 2022, 22 (15)
  • [33] An efficient conditional privacy-preserving authentication scheme with scalable revocation for VANETs
    Shen, Leyan
    Wang, Liangliang
    Zhang, Kai
    Li, Jinguo
    Chen, Kefei
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 133
  • [34] Efficient End-to-End Security Scheme for Privacy-Preserving in IoT
    Harbi, Yasmine
    Refoufi, Allaoua
    Aliouat, Zibouda
    Harous, Saad
    2019 4TH INTERNATIONAL CONFERENCE ON NETWORKING AND ADVANCED SYSTEMS (ICNAS 2019), 2019, : 94 - 99
  • [35] A Privacy-Preserving Authentication and Pseudonym Revocation Scheme for VANETs
    Qi, Jiayu
    Gao, Tianhan
    IEEE ACCESS, 2020, 8 : 177693 - 177707
  • [36] Privacy-Preserving Speaker Verification and Speech Recognition
    Abbasi, Wisam
    EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2022, 2023, 13782 : 102 - 119
  • [37] An Efficient Privacy-Preserving Comparison Protocol
    Saha, Tushar Kanti
    Koshiba, Takeshi
    ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2017, 2018, 7 : 553 - 565
  • [38] Privacy-preserving face recognition with outsourced computation
    Xiang, Can
    Tang, Chunming
    Cai, Yunlu
    Xu, Qiuxia
    SOFT COMPUTING, 2016, 20 (09) : 3735 - 3744
  • [39] An Efficient Privacy-Preserving Authenticated Key Agreement Scheme for Edge-Assisted Internet of Drones
    Gope, Prosanta
    Sikdar, Biplab
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (11) : 13621 - 13630
  • [40] Efficient Certificateless Conditional Privacy-Preserving Authentication for VANETs
    Zhou, Xiaotong
    Luo, Min
    Vijayakumar, Pandi
    Peng, Cong
    He, Debiao
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (07) : 7863 - 7875