Computations on Private Sets and their Application to Biometric based Authentication Systems

Wojciech Wodo, Lucjan Hanzlik, Kamil Kluczniak

2016

Abstract

In this paper we investigate the concept of cancelable biometrics and propose a new scheme for user authorisation providing anonymity based on privacy-preserving computations on sets. We define a problem called (t;n) -Threshold Subset Problem and apply it to a biometric-based security system. Our solution implements biometric template protection based on one-way transformations and Bloom filters. Users authentication data is stored in form of a whitelist and the authorisation process is based on a zero-knowledge proof approach. Using oblivious polynomial evaluation (OPE) a legitimate user is able to recreate a secret polynomial and answer the challenge send by a verifier. We assume that biometric data can be acquired and digitized to the form of a vector representation.

References

  1. Barni, M., Bianchi, T., Catalano, D., Di Raimondo, M., Donida Labati, R., Failla, P., Fiore, D., Lazzeretti, R., Piuri, V., Scotti, F., and Piva, A. (2010a). Privacypreserving Fingercode Authentication. In Proceedings of the 12th ACM Workshop on Multimedia and Security, MM&Sec 7810, pages 231-240, New York, NY, USA. ACM.
  2. Barni, M., Bianchi, T., Catalano, D., Raimondo, M. D., Labati, R. D., Failla, P., Fiore, D., Lazzeretti, R., Piuri, V., Piva, A., and Scotti, F. (2010b). A privacycompliant fingerprint recognition system based on homomorphic encryption and Fingercode templates. In Biometrics: Theory Applications and Systems (BTAS), 2010 Fourth IEEE International Conference on, pages 1-7.
  3. Bloom, B. H. (1970). Space/time trade-offs in hash coding with allowable errors. Commun. ACM, 13(7):422- 426.
  4. Bringer, J., Chabanne, H., Kevenaar, T. A. M., and Kindarji, B. (2009). Extending Match-on-card to Local Biometric Identification. In Proceedings of the 2009 Joint COST 2101 and 2102 International Conference on Biometric ID Management and Multimodal Communication, BioID MultiComm'09, pages 178-186, Berlin, Heidelberg. Springer-Verlag.
  5. Cristofaro, E. D., Gasti, P., and Tsudik, G. (2011). Fast and private computation of cardinality of set intersection and union. Cryptology ePrint Archive, Report 2011/141. http://eprint.iacr.org/.
  6. Cristofaro, E. D. and Tsudik, G. (2009). Practical private set intersection protocols with linear computational and bandwidth complexity. Cryptology ePrint Archive, Report 2009/491. http://eprint.iacr.org/.
  7. Kissner, L. and Song, D. (2005). Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedings, chapter PrivacyPreserving Set Operations, pages 241-257. Springer Berlin Heidelberg, Berlin, Heidelberg.
  8. Labati, R. D., Piuri, V., and Scotti, F. (2012). E-Business and Telecommunications: International Joint Conference, ICETE 2011, Seville, Spain, July 18-21, 2011, Revised Selected Papers, chapter Biometric Privacy Protection: Guidelines and Technologies, pages 3-19. Springer Berlin Heidelberg, Berlin, Heidelberg.
  9. Lee, C. and Kim, J. (2010). Cancelable fingerprint templates using minutiae-based bit-strings. J. Network and Computer Applications, 33(3):236-246.
  10. Naor, M. and Pinkas, B. (1999). Oblivious transfer and polynomial evaluation. In Proceedings of the Thirtyfirst Annual ACM Symposium on Theory of Computing, STOC 7899, pages 245-254, New York, NY, USA. ACM.
  11. Prabhakar, S. (2001). Fingerprint Classification and Matching Using a Filterbank. PhD thesis, Michigan State University, Computer Science & Engineering. 259 pages.
  12. Sarier, N. D. (2015). Information Security Theory and Practice: 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24- 25, 2015. Proceedings, chapter Private Minutia-Based Fingerprint Matching, pages 52-67. Springer International Publishing, Cham.
  13. Socek, D., Culibrk, D., and Bozovic, V. (2007). Practical secure biometrics using set intersection as a similarity measure. In SECRYPT 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, pages 25-32.
  14. Sutcu, Y., Li, Q., and Memon, N. (2007). Secure biometric templates from fingerprint-face features. In Computer Vision and Pattern Recognition, 2007. CVPR 7807. IEEE Conference on, pages 1-6.
Download


Paper Citation


in Harvard Style

Wodo W., Hanzlik L. and Kluczniak K. (2016). Computations on Private Sets and their Application to Biometric based Authentication Systems . In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016) ISBN 978-989-758-196-0, pages 452-457. DOI: 10.5220/0005992204520457


in Bibtex Style

@conference{secrypt16,
author={Wojciech Wodo and Lucjan Hanzlik and Kamil Kluczniak},
title={Computations on Private Sets and their Application to Biometric based Authentication Systems},
booktitle={Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016)},
year={2016},
pages={452-457},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005992204520457},
isbn={978-989-758-196-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016)
TI - Computations on Private Sets and their Application to Biometric based Authentication Systems
SN - 978-989-758-196-0
AU - Wodo W.
AU - Hanzlik L.
AU - Kluczniak K.
PY - 2016
SP - 452
EP - 457
DO - 10.5220/0005992204520457