期刊文献+

基于二进制加密电路的指纹细节点匹配 被引量:3

Minutiae Matching Based on Garbled Circuits
下载PDF
导出
摘要 为了在开放网络的身份鉴别中安全地使用指纹认证技术,需要保护用户和服务器各自的指纹数据的隐私性。提出了一种新的指纹细节点匹配算法,由服务器的细节点模板和用户现场细节点集合组成序列通过不经意排序后,对序列相邻位置进行相等性测试,最后通过加法器计算出匹配细节点的数量。用加密二进制电路实现了上述算法并进行了电路结构优化。实验表明本方法能够进行实时指纹认证处理。 To securely employ fingerprint-based identity authentication in open network,private fingerprint data of a user and a server must be protected.A novel algorithm was presented to perform the minutiae matching while privacy of the two parties was preserved.In the proposed algorithm,a sequence consisting of the template of the server and query minutiae of the user was firstly sorted by oblivious sorting algorithm.Then,all the neighbor elements of the sequence were tested whether they are equal.Finally,several adders were used to compute the quantity of matched elements.The proposed algorithm was crystallized by using garbled circuits and some approaches were taken to optimize the structure of circuits.Experiment results showed that the proposed scheme is capable of real-time authentication.
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2013年第2期75-80,共6页 Journal of Sichuan University (Engineering Science Edition)
基金 国家自然科学基金资助项目(61062012)
关键词 细节点 加密二进制电路 隐私保护 不经意排序 minutiae garbled circuits privacy protection oblivious sorting
  • 相关文献

参考文献17

  • 1Jain A K, Nandakumar K, Nagar A. Biometric template security[C]//EURASIP J Adv Signal Process 2008. 2008:1 - 17.
  • 2Lindell Y, Pinkas B. A proof of Yao' s protocol for secure two-party computation [ J ]. Journal of Cryptology, 2009,22 (2) :161 - 188.
  • 3Rappe D K. Homomorphic cryptosystems and their applications [ D ]. Dortmund, Germany: University of Dortmund, 2004, http ://www. rappe, de/doerte/Diss, pdf.
  • 4Feng Q, Su F, Cai A N, Secure remote authentication using fingerprint and fuzzy private matching [ C ]//2009 International Symposium on Intelligent Information Systems and Applications (IISA 2009 ). Qingdao : Academy Publisher,2009 : 290 - 292.
  • 5Erkin Z, Franz M, Guajardo J, et al. Privacy-preserving face recognition[C]//Proceedings of the 9th International Symposium on Privacy Enhancing Technologies. Seattle, WA- Springer-Verlag,2009:235 - 253.
  • 6Sadeghi A, Schneider T, Wehrenberg I. Efficient privacy preserving face recognition[ C]//Proceedings of the 12th Annual International Conference on Information Security and Cryptology. Pisa, Italy: Springer-Verlag, LNCS, 2009 (5984) :235 - 253.
  • 7Barni M, Bianchi T, Catalano D, et al. A privacy-compliant fingerprint recognition system based on homomorphic cryption and fingercode templates [ C ]//2010 Fourth IEEE International Conference on Biometrics:Theory Applications and Systems( BTAS). 2010 : 1 - 7.
  • 8Jain A K, Prabhakar S, Hong L, et al. Fiherbank-based fingerprint matching [ J ]. IEEE Transactions on Image Processing, 2000,9 (5) : 846 - 859.
  • 9Blanton M, Gasti P. Secure and efficient protocols for Iris and fingerprint Identification [ EB/OL]. 2010. http:// eprint, iacr. org/2010/627, pdf.
  • 10Huang Y, Malka L, Evans D, et al. Efficient privacy-preserving biometric identification[ C ]. 18th Network and Distributed System Security Conference,2011:6 -9.

同被引文献36

  • 1Yao A C.How to generate and exchange secrets[C]//IEEESymposium on Foundations of Computer Science(FOCS' 86), 1986:162-167.
  • 2Rappe D K.Homomorphic cryptosystems and their applica- tions[D].Germany: University of Dortmund,2004.
  • 3Feng Q, Su F, Cai A N.Secure remote authentication using fingerprint and fuzzy private matching[C]//2009 International Symposium on Intelligent Information Systems and Applica- tions(liSA 2009).Qingdao, China: Academy Publisher, 2009: 290-292.
  • 4Erkin Z, Franz M, Guajardo J, et al.Privacy-preserving face recognition[C]//Privacy Enhancing Technologies Symposium (PETS' 09 ).Berlin, Heidelberg: Springer-Verlag, 2009 : 235-253.
  • 5Sadeghi A R, Schneider T, Wehrenberg I.Efficient privacy- preserving face recognition[C]//LNCS 5984 : International Conference on Information Security and Cryptology(ICISC), 2009: 229-244.
  • 6Barni M,Bianchi T,Catalano D,et al.Privacy-preserving fin- gercode authentication[C]//ACM Workshop on Multimedia and Security(MM&Sec), 2010 : 231-240.
  • 7Huang Y, Malka L, Evans D et al.Efflcient privacy-preserving biometric identification[C]//18th Network and Distributed System Security Conference(NDSS 2011).San Diego, Cali- fornia: Internet Society,2011.
  • 8Schneider T.Engineering secure two-party computation pro- tocols advances in design, optimization, and applications of efficient secure function evaluation[D].Germany: Ruhr Uni- versity, 2011.
  • 9Ishai Y, Kilian J.Extending oblivious transfers efficiently[C]// 23rd International Conference on Cryptology(CRYPTO) , 2003.
  • 10Kolesnikov V, Schneider T.Improved garbled circuit: free XOR gates and applications[C]//LNCS 5126: International Colloquium on Automata, Languages and Programming (ICALP ' 08), 2008:486-498.

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部