CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Introduction to Secure Computation
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Designs, Codes and Cryptography
Processing encrypted signals: a new frontier for multimedia security
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Generating Cancelable Fingerprint Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
Editorial: Signal processing in the encrypted domain
EURASIP Journal on Information Security
EURASIP Journal on Advances in Signal Processing
Secure Biometric Authentication with Improved Accuracy
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Secure Computation for Privacy Preserving Biometric Data Retrieval and Authentication
EuroISI '08 Proceedings of the 1st European Conference on Intelligence and Security Informatics
Efficient Biometric Verification in Encrypted Domain
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Privacy-Preserving Face Recognition
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
An authentication protocol with encrypted biometric data
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
Cancelable key-based fingerprint templates
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Protecting Biometric Templates With Sketch: Theory and Practice
IEEE Transactions on Information Forensics and Security - Part 2
A privacy-preserving buyer-seller watermarking protocol with semi-trust third party
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Hi-index | 0.00 |
The fuzzy commitment approach has gained popularity as away to protect biometric data used for identity verification of authentication. As it has been show recently, though, the use of fuzzy commitment is unavoidably linked to some leakage of information regarding the biometric template. An additional problem typical of authentication systems is that the user may want to protect his privacy, that is it would be desirable that the server only verifies whether the biometric template provided by the user is contained within the list of registered users without that the particular identity of the user accessing the system is revealed. The e-sketch protocol proposed in this paper, solves the above two problems by resorting to tools from Multi Party Computation relying on the additively homomorphic property of the underlying cryptosystem (e.e. the Pailler's cryptosystem). The security and the complexity of the proposed protocol are discussed.