[go: up one dir, main page]

Skip to main content

An Efficient Privacy-Preserving Palmprint Authentication Scheme Based on Homomorphic Encryption

  • Conference paper
  • First Online:
Cyberspace Safety and Security (CSS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10581))

Included in the following conference series:

  • 2206 Accesses

Abstract

In order to provide protection for biometric features in palmprint authentication, we propose a palmprint authentication scheme suitable for personal environments with privacy-preserving trait using the ElGamal encryption scheme which is mulplicatively homomorphic. To achieve faster running speed, we use binary vectors to represent palmprint features and use Hamming distance to indicate the similarity of different feature vectors. We give security and performance analysis, and use Matlab to implement some key modules of the proposed scheme. Theoretical analysis and experimental results show that the proposed scheme achieves confidential computations of palmprint feature vectors. The recognition accuracy can meet practical requirements and the overall performance transcends existing relative schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001)

    Article  Google Scholar 

  2. Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. EURASIP J. Adv. Signal Process. 113 (2008)

    Google Scholar 

  3. Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325–341. Springer, Heidelberg (2005). doi:10.1007/978-3-540-30576-7_18

    Chapter  Google Scholar 

  4. Luo, Z.: Research on blind identity authentication protocol based on biometrics. Ph.D. thesis, Beijing Jiaotong University, Beijing (2014)

    Google Scholar 

  5. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  6. Upmanyu, M., Namboodiri, A.M., Srinathan, K., Jawahar, C.V.: Blind authentication: a secure crypto-biometric verification protocol. IEEE Trans. Inf. Forensics Secur. 5(2), 255–268 (2010)

    Article  Google Scholar 

  7. Schoenmakers, B., Tuyls, P.: Computationally secure authentication with noisy data. In: Tuyls, P., Skoric, B., Kevenaar, T. (eds.) Security with Noisy Data, pp. 141–149. Springer, London (2007). doi:10.1007/978-1-84628-984-2_9

    Chapter  Google Scholar 

  8. Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, I., Toft, T.: Privacy-preserving face recognition. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 235–253. Springer, Heidelberg (2009). doi:10.1007/978-3-642-03168-7_14

    Chapter  Google Scholar 

  9. Blanton, M., Gasti, P.: Secure and efficient protocols for iris and fingerprint identification. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 190–209. Springer, Heidelberg (2011). doi:10.1007/978-3-642-23822-2_11

    Chapter  Google Scholar 

  10. Qu, Y.: Research on palmprint authentication based on homomorphic encryption. Ph.D. thesis, Southwest Jiaotong University (2015)

    Google Scholar 

  11. ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18. Springer, Heidelberg (1985). doi:10.1007/3-540-39568-7_2

    Chapter  Google Scholar 

  12. Im, J.H., Choi, J.C., Nyang, D.H., Lee, M.K.: Privacy-preserving palm print authentication using homomorphic encryption. In: IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress, Auckland, pp. 878–881 (2016)

    Google Scholar 

  13. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). doi:10.1007/3-540-48910-X_16

    Chapter  Google Scholar 

  14. Catalano, D., Fiore, D.: Using linearly-homomorphic encryption to evaluate degree-2 functions on encrypted data. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, pp. 1518–1529. ACM (2015)

    Google Scholar 

  15. Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2), 270–299 (1984)

    Article  MATH  MathSciNet  Google Scholar 

  16. Du, X., Zhang, M., Nygard, K.E., Guizani, S., Chen, H.-H.: Self-healing sensor networks with distributed decision making. Int. J. Sens. Netw. 2(5–6), 289–298 (2007)

    Article  Google Scholar 

  17. Yue, F., Zuo, W., Zhang, D.: A survey of palmprint recognition. J. Autom. 36(3), 353–365 (2010)

    Google Scholar 

  18. Yang, J., Zhang, D., Yang, J.-Y., Niu, B.: Globally maximizing, locally minimizing: unsupervised discriminant projection with applications to face and palm biometrics. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 650–664 (2007)

    Article  Google Scholar 

  19. Connie, T., Jin, A.T.B., Ong, M.G.K., Ling, D.N.C.: An automated palmprint recognition system. Image Vis. Comput. 23(5), 501–515 (2005)

    Article  Google Scholar 

  20. Bingham, E., Mannil, H.:. Random projection in dimensionality reduction: applications to image and text data. In: Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, pp. 245–250. ACM (2001)

    Google Scholar 

  21. Achlioptas, D.: Database-friendly random projections: Johnson-lindenstrauss with binary coins. J. Comput. Syst. Sci. 66(4), 671–687 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  22. Yao, X., Han, X., Xiaojiang, D., Zhou, X.: A lightweight multicast authentication mechanism for small scale IoT applications. IEEE Sens. J. 13(10), 3693–3701 (2013)

    Article  Google Scholar 

Download references

Acknowledgements

This work is partially supported by the National Natural Science Foundation of China “Research on Key Technologies of Secure Cloud Data Storage Based on (Fully) Homomorphic Encryption” (Grant No. 61772150), the Crypto Development Fund of China (Grant No. MMJJ20170217) and the open subject project “Palmprint feature protection research based on homomorphic encryption” of Guangxi Key Laboratory of cryptography and information security (Approval No. GCIS201622) and the planning fund project of ministry of education (12YJAZH136).

We thank Diongxiong WU and Zhiqiang Gao for helpful comments and discussions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yong Ding .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Wang, H., Ding, Y., Tang, S., Wang, J. (2017). An Efficient Privacy-Preserving Palmprint Authentication Scheme Based on Homomorphic Encryption. In: Wen, S., Wu, W., Castiglione, A. (eds) Cyberspace Safety and Security. CSS 2017. Lecture Notes in Computer Science(), vol 10581. Springer, Cham. https://doi.org/10.1007/978-3-319-69471-9_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69471-9_39

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69470-2

  • Online ISBN: 978-3-319-69471-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics