2016
DOI: 10.1007/978-3-319-29883-2_12
|View full text |Cite
|
Sign up to set email alerts
|

Comprehensive and Improved Secure Biometric System Using Homomorphic Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…Thanks to the underlying threshold HE scheme, a hostile database owner cannot fully decrypt the encrypted templates of users in the database. Mandal et al [ 93 ] built a cryptographically secure system using the HE scheme proposed by Brakerski and Vaikuntanathan [ 94 ]. The authors designed a challenge–response authentication mechanism and a decentralised architecture in which calculation and authentication are separated.…”
Section: He-based Approaches To Biometric Securitymentioning
confidence: 99%
“…Thanks to the underlying threshold HE scheme, a hostile database owner cannot fully decrypt the encrypted templates of users in the database. Mandal et al [ 93 ] built a cryptographically secure system using the HE scheme proposed by Brakerski and Vaikuntanathan [ 94 ]. The authors designed a challenge–response authentication mechanism and a decentralised architecture in which calculation and authentication are separated.…”
Section: He-based Approaches To Biometric Securitymentioning
confidence: 99%
“…This allows the confidentiality of biometric data to be protected and matching to be performed between encrypted template data and encrypted query data without degrading recognition accuracy. As long as the decryption key is safe, the system is cryptographically secure [ 106 ].…”
Section: Potential Solutions and Opportunitiesmentioning
confidence: 99%
“…In these schemes, the biometric identification scheme is considered to be a two-party system, where the data owner takes charge of biometric dataset management and template matching. Most of these schemes are designed based on the secure computation protocol [18][19][20] and homomorphic encryption [9,21,22] techniques. Although the privacy-preserving is achieved in these schemes, the data owner is required to be equipped with powerful computing ability and remarkable storage capacity in these schemes, which can hardly be satisfied in most application scenarios and thus makes these schemes unpractical.…”
Section: Related Workmentioning
confidence: 99%