A randomized protocol for signing contracts
Communications of the ACM
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
All-or-nothing disclosure of secrets
Proceedings on Advances in cryptology---CRYPTO '86
Multi party computations: past and present
PODC '97 Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing
Efficient oblivious transfer protocols
SODA '01 Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms
Secure multi-party computation problems and their applications: a review and open problems
Proceedings of the 2001 workshop on New security paradigms
Privacy-Preserving Cooperative Scientific Computations
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
Protocols for secure computations
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
Service-Oriented Modeling: Service Analysis, Design, and Architecture
Service-Oriented Modeling: Service Analysis, Design, and Architecture
Secure remote authentication using biometric data
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Hi-index | 0.00 |
This research investigates slice-based architecture for biometrics. A service slice is an aggregation of resources for a specific biometric objective; e.g., speaker verification. Slice-based architecture is attractive as a framework for modeling service-oriented biometric applications. In order for it to be usable, slice-based architecture must adequately address privacy, security, and standard based interoperability. We propose to incorporate secure computation mechanism and BioAPI standard into slice-based architecture. We discuss why secure computation is information-theoretic secure, and how it can be used to realize a private computation for the exchange of biometric data between two parties in slice-based architecture. For proof-of-concept, open source software is developed for realizing a privacy preserving voice verification prototype based on slice-based architecture, and will be released for experimentation by the public. The result of our initial experimentation is reported.