Privacy-preserving fingercode authentication

  • Authors:
  • Mauro Barni;Tiziano Bianchi;Dario Catalano;Mario Di Raimondo;Ruggero Donida Labati;Pierluigi Failla;Dario Fiore;Riccardo Lazzeretti;Vincenzo Piuri;Fabio Scotti;Alessandro Piva

  • Affiliations:
  • Università di Siena, Siena, Italy;Università di Firenze, Firenze, Italy;Università di Catania, Catania, Italy;Università di Catania, Catania, Italy;Università di Milano, Milano, Italy;Università di Siena, Siena, Italy;École normale supérieure, Paris, France;Università di Siena, Siena, Italy;Università di Milano, Milano, Italy;Università di Milano, Milano, Italy;Università di Firenze, Firenze, Italy

  • Venue:
  • Proceedings of the 12th ACM workshop on Multimedia and security
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present a privacy preserving protocol for fingerprint-based authentication. We consider a scenario where a client equipped with a fingerprint reader is interested into learning if the acquired fingerprint belongs to the database of authorized entities managed by a server. For security, it is required that the client does not learn anything on the database and the server should not get any information about the requested biometry and the outcome of the matching process. The proposed protocol follows a multi-party computation approach and makes extensive use of homomorphic encryption as underlying cryptographic primitive. To keep the protocol complexity as low as possible, a particular representation of fingerprint images, named Fingercode, is adopted. Although the previous works on privacy-preserving biometric identification focus on selecting the best matching identity in the database, our main solution is a generic identification protocol and it allows to select and report all the enrolled identities whose distance to the user's fingercode is under a given threshold. Variants for simple authentication purposes are provided. Our protocols gain a notable bandwidth saving (about 25-39%) if compared with the best previous work (ICISC'09) and its computational complexity is still low and suitable for practical applications. Moreover, even if such protocols are presented in the context of a fingerprint-based system, they can be generalized to any biometric system that shares the same matching methodology, namely distance computation and thresholding.