Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection

Pia Bauspieß, Jascha Kolberg, Daniel Demmler, Juliane Krämer, C. Busch
{"title":"Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection","authors":"Pia Bauspieß, Jascha Kolberg, Daniel Demmler, Juliane Krämer, C. Busch","doi":"10.1109/WIFS49906.2020.9360881","DOIUrl":null,"url":null,"abstract":"Thinking about the protection of biometric data, future attacks using a quantum computer call for adequate resistance of biometric verification systems. Such systems are often deployed on a long-term basis and deserve strong protection due to the sensitive nature and persistence property of the data they contain. To achieve efficient template protection, we combine post-quantum secure two-party computation with secret sharing and apply the first practically implemented post-quantum secure two-party computation protocol for the purpose of biometric template protection. The proposed system ensures permanent protection of the biometric data as templates are stored and compared in the encrypted domain. For the verification, we present two options which can be achieved as real-time transactions: A well-established classical two-party computation scheme or a recent post-quantum upgrade of that scheme. Both methods maintain full biometric performance. For the database of reference templates, which is a target for attacks in a biometric system, post-quantum security is maintained throughout both verification options. Regarding the computational efficiency of our proposed system, we offer real-time computational transaction times, making our solution relevant for practical applications.","PeriodicalId":354881,"journal":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WIFS49906.2020.9360881","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Thinking about the protection of biometric data, future attacks using a quantum computer call for adequate resistance of biometric verification systems. Such systems are often deployed on a long-term basis and deserve strong protection due to the sensitive nature and persistence property of the data they contain. To achieve efficient template protection, we combine post-quantum secure two-party computation with secret sharing and apply the first practically implemented post-quantum secure two-party computation protocol for the purpose of biometric template protection. The proposed system ensures permanent protection of the biometric data as templates are stored and compared in the encrypted domain. For the verification, we present two options which can be achieved as real-time transactions: A well-established classical two-party computation scheme or a recent post-quantum upgrade of that scheme. Both methods maintain full biometric performance. For the database of reference templates, which is a target for attacks in a biometric system, post-quantum security is maintained throughout both verification options. Regarding the computational efficiency of our proposed system, we offer real-time computational transaction times, making our solution relevant for practical applications.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
虹膜生物识别模板保护的后量子安全两方计算
考虑到生物识别数据的保护,未来使用量子计算机的攻击需要生物识别验证系统的足够抵抗。这类系统通常是长期部署的,由于它们所包含的数据的敏感性和持久性,应该得到强有力的保护。为了实现高效的模板保护,我们将后量子安全两方计算与秘密共享相结合,应用了第一个实际实现的后量子安全两方计算协议来保护生物特征模板。该系统确保了模板在加密域中存储和比较时对生物特征数据的永久保护。对于验证,我们提出了两种可以作为实时交易实现的选项:一个成熟的经典两方计算方案或该方案的最近后量子升级。这两种方法都保持了完全的生物识别性能。参考模板数据库是生物识别系统中攻击的目标,在这两种验证方案中都保持了后量子安全性。关于我们提出的系统的计算效率,我们提供了实时计算事务时间,使我们的解决方案与实际应用相关。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection AmpleDroid Recovering Large Object Files from Android Application Memory The Suitability of RSA for Bulk Data Encryption ALASKA#2: Challenging Academic Research on Steganalysis with Realistic Images Landmark Breaker: Obstructing DeepFake By Disturbing Landmark Extraction
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1