Difference between revisions of "Zhang2016"
From ACES
(Import from BibTeX) |
m (Import from BibTeX) |
||
Line 3: | Line 3: | ||
|keywords=Fingerprint Authentication, Garbled Circuit, Secure Function Evaluation, Secure Multiparty Computation | |keywords=Fingerprint Authentication, Garbled Circuit, Secure Function Evaluation, Secure Multiparty Computation | ||
|abstract=<p>This paper presents the first scalable, efficient, and reliable privacy-preserving fingerprint authentication based on minutiae representation. Our method is provably secure by leveraging the Yao\’s classic Garbled Circuit (GC) protocol. While the concept of using GC for secure fingerprint matching has been suggested earlier, to the best of our knowledge, no prior reliable method or implementation applicable to real fingerprint data has been available. Our technique achieves both accuracy and practicability by customizing a widely adopted minutiaebased fingerprint matching algorithm, Bozorth matcher, as our core authentication engine. We modify the Bozorth matcher and identify certain sensitive parts of this algorithm. For these critical parts, we create a sequential circuit description which can be efficiently synthesized and customized to GC using the TinyGarble framework. We show evaluations of our modified matching algorithm on a standard fingerprint database FVC2002 DB2 to demonstrate its reliability. The implementation of privacy-preserving fingerprint authentication using Synopsis Design Compiler on a commercial Intel processor shows the efficiency and scalability of the proposed methodologies.</p> | |abstract=<p>This paper presents the first scalable, efficient, and reliable privacy-preserving fingerprint authentication based on minutiae representation. Our method is provably secure by leveraging the Yao\’s classic Garbled Circuit (GC) protocol. While the concept of using GC for secure fingerprint matching has been suggested earlier, to the best of our knowledge, no prior reliable method or implementation applicable to real fingerprint data has been available. Our technique achieves both accuracy and practicability by customizing a widely adopted minutiaebased fingerprint matching algorithm, Bozorth matcher, as our core authentication engine. We modify the Bozorth matcher and identify certain sensitive parts of this algorithm. For these critical parts, we create a sequential circuit description which can be efficiently synthesized and customized to GC using the TinyGarble framework. We show evaluations of our modified matching algorithm on a standard fingerprint database FVC2002 DB2 to demonstrate its reliability. The implementation of privacy-preserving fingerprint authentication using Synopsis Design Compiler on a commercial Intel processor shows the efficiency and scalability of the proposed methodologies.</p> | ||
|month=5 | |||
|year=2016 | |||
|booktitle=IEEE International Symposium on Hardware Oriented Security and Trust(HOST) | |booktitle=IEEE International Symposium on Hardware Oriented Security and Trust(HOST) | ||
|title=Robust Privacy-Preserving Fingerprint Authentication | |title=Robust Privacy-Preserving Fingerprint Authentication | ||
|entry=inproceedings | |entry=inproceedings | ||
}} | }} |
Revision as of 03:43, 4 September 2021
Zhang2016 | |
---|---|
entry | inproceedings |
address | |
annote | |
author | Ye Zhang and Farinaz Koushanfar |
booktitle | IEEE International Symposium on Hardware Oriented Security and Trust(HOST) |
chapter | |
edition | |
editor | |
howpublished | |
institution | |
journal | |
month | 5 |
note | |
number | |
organization | |
pages | |
publisher | |
school | |
series | |
title | Robust Privacy-Preserving Fingerprint Authentication |
type | |
volume | |
year | 2016 |
doi | |
issn | |
isbn | |
url | |