Access the full text.
Sign up today, get DeepDyve free for 14 days.
A. Juels, M. Sudan (2002)
A Fuzzy Vault SchemeDesigns, Codes and Cryptography, 38
L. Prechelt (1999)
Technical opinion: comparing Java vs. C/C++ efficiency differences to interpersonal differencesCommun. ACM, 42
R. Mollin (2000)
An introduction to cryptography
N. Ratha, J. Connell, R. Bolle (2001)
Enhancing security and privacy in biometrics-based authentication systemsIBM Syst. J., 40
S. Prabhakar, Sharath Pankanti, Anil Jain (2003)
Biometric Recognition: Security and Privacy ConcernsIEEE Secur. Priv., 1
J. Coron, Avradip Mandal, D. Naccache, Mehdi Tibouchi (2011)
Fully Homomorphic Encryption over the Integers with Shorter Public KeysIACR Cryptol. ePrint Arch., 2011
Craig Gentry (2010)
Computing arbitrary functions of encrypted dataCommun. ACM, 53
K. Simoens, P. Tuyls, B. Preneel (2009)
Privacy Weaknesses in Biometric Sketches2009 30th IEEE Symposium on Security and Privacy
Marten Dijk, Craig Gentry, S. Halevi, V. Vaikuntanathan (2010)
Fully Homomorphic Encryption over the Integers
A. Goh, D. Ngo (2003)
Computation of Cryptographic Keys from Face Biometrics
Craig Gentry (2009)
Fully homomorphic encryption using ideal lattices
Craig Gentry (2009)
A fully homomorphic encryption scheme
E. Kindt (2013)
Best Practices for Privacy and Data Protection for the Processing of Biometric Data
Craig Gentry, S. Halevi (2011)
Implementing Gentry's Fully-Homomorphic Encryption Scheme
B. Škorić (2010)
Security with Noisy Data - (Extended Abstract of Invited Talk)
Yuanmi Chen, Phong Nguyen (2011)
BKZ 2.0: Better Lattice Security Estimates
Masaya Yasuda, Jun Yajima, Takeshi Shimoyama, Jun Kogure (2012)
Analysis of Lattice Reduction Attack against the Somewhat Homomorphic Encryption Based on Ideal Lattices
P. Campisi (2013)
Security and Privacy in Biometrics: Towards a Holistic Approach
N. Ratha, J. Connell, R. Bolle (2003)
Biometrics break-ins and band-aidsPattern Recognit. Lett., 24
A. Lenstra, H. Lenstra, L. Lovász (1982)
Factoring polynomials with rational coefficientsMathematische Annalen, 261
Zvika Brakerski, V. Vaikuntanathan (2011)
Efficient Fully Homomorphic Encryption from (Standard) LWE2011 IEEE 52nd Annual Symposium on Foundations of Computer Science
Anil Jain, K. Nandakumar, Abhishek Nagar (2008)
Biometric Template SecurityEURASIP J. Adv. Signal Process., 2008
Zvika Brakerski, Craig Gentry, V. Vaikuntanathan (2012)
(Leveled) fully homomorphic encryption without bootstrapping
J. Bringer, H. Chabanne, Alain Patey (2013)
Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent TrendsIEEE Signal Processing Magazine, 30
Shuiming Ye, Ying Luo, Jian Zhao, S. Cheung (2009)
Anonymous Biometric Access ControlEURASIP Journal on Information Security, 2009
Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, K. Yokoyama, Takeshi Koshiba (2013)
Secure pattern matching using somewhat homomorphic encryptionProceedings of the 2013 ACM workshop on Cloud computing security workshop
Goldreich Oded (2004)
Foundations of Cryptography: Volume 2, Basic Applications
M. Caloyannides (2003)
Privacy vs. Information TechnologyIEEE Secur. Priv., 1
J. Daugman (1997)
Neural Image Processing Strategies Applied in Real-Time Pattern RecognitionReal Time Imaging, 3
J. Daugman (2000)
Biometric decision landscapes
C. Rathgeb, A. Uhl (2011)
A survey on biometric cryptosystems and cancelable biometricsEURASIP Journal on Information Security, 2011
Phong Nguyen (2011)
Lattice Reduction Algorithms: Theory and Practice
J. Bringer, H. Chabanne, B. Kindarji (2009)
Identification with encrypted biometric dataSecur. Commun. Networks, 4
R. Bolle, J. Connell, N. Ratha (2002)
Biometric perils and patchesPattern Recognit., 35
A. Juels, M. Wattenberg (1999)
A fuzzy commitment scheme
Anil Jain, A. Ross, S. Prabhakar (2004)
An introduction to biometric recognitionIEEE Transactions on Circuits and Systems for Video Technology, 14
Purpose – The purpose of this paper is to determine the effectiveness of using fully homomorphic encryption (FHE) to preserve the privacy of biometric data in an authentication system. Biometrics offers higher accuracy for personal recognition than traditional methods because of its properties. Biometric data are permanently linked with an individual and cannot be revoked or cancelled, especially when biometric data are compromised, leading to privacy issues. Design/methodology/approach – By reviewing current approaches, FHE is considered as a promising solution for the privacy issue because of its ability to perform computations in the encrypted domain. The authors studied the effectiveness of FHE in biometric authentication systems. In doing so, the authors undertake the study by implementing a protocol for biometric authentication system using iris. Findings – The security analysis of the implementation scheme demonstrates the effectiveness of FHE to protect the privacy of biometric data, as unlimited operations can be performed in the encrypted domain, and the FHE secret key is not shared with any other party during the authentication protocol. Research limitations/implications – The use of malicious model in the design of the authentication protocol to improve the privacy, packing methods and use of low-level programming language to enhance performance of the system needs to be further investigated. Originality/value – The main contributions of this paper are the implementation of a privacy-preserving iris biometric authentication protocol adapted to lattice-based FHE and a sound security analysis of authentication and privacy.
International Journal of Pervasive Computing and Communications – Emerald Publishing
Published: Jun 1, 2015
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.