Biometric authentication, and notably using fingerprints, are now common. Despite its usability, biometrics have however a caveat which is the impossibility of revocation: once the raw fingerprint is breached, and depending on the technology of the reader, it is impossible to stop an illegitimate authentication. This places a focus on auditing both to detect fraud and to have clear indications that the fingerprint has been breached. In this paper we show how to take advantage of the immutability property of Blockchains to design an auditable protocol based on Diffie-Hellman key exchange with applications to fingerprint authentication.
Auditing operations in multi-party data exchange, and over an arbitrary topology, is a common requirement yet still an open problem especially in the case where no trust on any participating party can be presumed. The challenges range from storage of the audit trail to tampering and collusion of participating entities. In this paper, we propose a blockchain-based auditing scheme. It is designed based on public key infrastructure and Shamir secret sharing scheme.
More and more individuals and enterprises outsource data and applications to cloud servers in recent years. Since the public cloud servers are not completely trusted, users usually encrypt important data before sending it to cloud servers. As a result, ciphertext retrieval technology has gradually become a research hotspot. In the existing related schemes, there are some defects such as not supporting "multiple owners" mode and multi-keyword retrieval, having low retrieval efficiency, accuracy and security, and difficult data updating. Hence, we propose an efficient Ciphertext Retrieval scheme based on Homomorphic encryption for Multiple data owners in hybrid cloud (CRHM), in which the public cloud server and the private cloud server cooperate to perform the ciphertext retrieval. In CRHM, an encrypted balanced binary index tree structure and a homomorphic encryption method based on large integer operations are designed to support "multiple owners" mode and multi-keyword ranked retrieval. The security analysis shows that CRHM can effectively guarantee the privacy and security of user file and retrieval, and the performance evaluation demonstrates that compared with the existing related schemes, CRHM has high efficiency in the index generation and retrieval processes, while keeps relatively high retrieval accuracy.INDEX TERMS Hybrid cloud, Ciphertext retrieval, Homomorphic encryption, Balanced binary index tree I. INTRODUCTION
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.