Efficient privacy-preserving face verification scheme

被引:9
作者
Huang, Hai [1 ]
Wang, Luyao [1 ]
机构
[1] Zhejiang Sci Tech Univ, Informat Sch, Hangzhou 310018, Peoples R China
关键词
Privacy-preserving computation; Face verification; Computation over encrypted data; Fully homomorphic encryption; Garbled circuit; HOMOMORPHIC ENCRYPTION; SECURE; AUTHENTICATION;
D O I
10.1016/j.jisa.2021.103055
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Face verification has been a promising artificial intelligence technique and is becoming increasingly popular in civilian and law enforcement applications that require reliable biometric authentication. However, the wide deployment of face verification systems has raised serious privacy concerns regarding the abuse of users' face images. In this paper, we present an efficient privacy-preserving face verification scheme based on fully homomorphic encryption and garbled circuit. Our protocol is the first one that guarantees that the server cannot learn anything about users' face images and the verification result while providing the face verification service, and the client learns nothing beyond the verification result. Experimental results show that our scheme takes less than one second to perform a privacy-preserving face verification.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] An efficient and privacy-preserving mutual authentication with key agreement scheme for telecare medicine information system
    Chen, Yulei
    Chen, Jianhua
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (01) : 516 - 528
  • [42] Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    Deng, Robert H.
    Lu, Rongxing
    Weng, Jian
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (01) : 27 - 39
  • [43] A Hybrid Approach for Efficient Privacy-Preserving Authentication in VANET
    Rajput, Ubaidullah
    Abbas, Fizza
    Eun, Hasoo
    Oh, Heekuck
    IEEE ACCESS, 2017, 5 : 12014 - 12030
  • [44] Efficient Privacy-Preserving Authentication in Wireless Mobile Networks
    Jo, Hyo Jin
    Paik, Jung Ha
    Lee, Dong Hoon
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (07) : 1469 - 1481
  • [45] EPDAS: Efficient privacy-preserving data analysis scheme for smart grid network
    Kamil, Ismaila Adeniyi
    Ogundoyin, Sunday Oyinlola
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (02) : 208 - 217
  • [46] Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0
    Wang, Chenyu
    Wang, Ding
    Xu, Guoai
    He, Debiao
    SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (01)
  • [47] Efficient Privacy-Preserving Access Control Scheme in Electronic Health Records System
    Ming, Yang
    Zhang, Tingting
    SENSORS, 2018, 18 (10)
  • [48] A privacy-preserving parallel and homomorphic encryption scheme
    Min, Zhaoe
    Yang, Geng
    Shi, Jingqi
    OPEN PHYSICS, 2017, 15 (01): : 135 - 142
  • [49] A Privacy-Preserving Signature Scheme for Network Coding
    Liu, Xiang
    Huang, Jie
    Wu, Yuanxi
    Zong, Guowen
    IEEE ACCESS, 2019, 7 : 109739 - 109750
  • [50] An efficient blockchain-based privacy-preserving scheme with attribute and homomorphic encryption
    Xu, Guangxia
    Zhang, Jiajun
    Cliff, Uchani Gutierrez Omar
    Ma, Chuang
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 10715 - 10750