Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection

Pia Bauspieß, Jascha Kolberg, Daniel Demmler, Juliane Krämer, C. Busch
{"title":"Post-Quantum Secure Two-Party Computation for Iris Biometric Template Protection","authors":"Pia Bauspieß, Jascha Kolberg, Daniel Demmler, Juliane Krämer, C. Busch","doi":"10.1109/WIFS49906.2020.9360881","DOIUrl":null,"url":null,"abstract":"Thinking about the protection of biometric data, future attacks using a quantum computer call for adequate resistance of biometric verification systems. Such systems are often deployed on a long-term basis and deserve strong protection due to the sensitive nature and persistence property of the data they contain. To achieve efficient template protection, we combine post-quantum secure two-party computation with secret sharing and apply the first practically implemented post-quantum secure two-party computation protocol for the purpose of biometric template protection. The proposed system ensures permanent protection of the biometric data as templates are stored and compared in the encrypted domain. For the verification, we present two options which can be achieved as real-time transactions: A well-established classical two-party computation scheme or a recent post-quantum upgrade of that scheme. Both methods maintain full biometric performance. For the database of reference templates, which is a target for attacks in a biometric system, post-quantum security is maintained throughout both verification options. Regarding the computational efficiency of our proposed system, we offer real-time computational transaction times, making our solution relevant for practical applications.","PeriodicalId":354881,"journal":{"name":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Workshop on Information Forensics and Security (WIFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WIFS49906.2020.9360881","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Thinking about the protection of biometric data, future attacks using a quantum computer call for adequate resistance of biometric verification systems. Such systems are often deployed on a long-term basis and deserve strong protection due to the sensitive nature and persistence property of the data they contain. To achieve efficient template protection, we combine post-quantum secure two-party computation with secret sharing and apply the first practically implemented post-quantum secure two-party computation protocol for the purpose of biometric template protection. The proposed system ensures permanent protection of the biometric data as templates are stored and compared in the encrypted domain. For the verification, we present two options which can be achieved as real-time transactions: A well-established classical two-party computation scheme or a recent post-quantum upgrade of that scheme. Both methods maintain full biometric performance. For the database of reference templates, which is a target for attacks in a biometric system, post-quantum security is maintained throughout both verification options. Regarding the computational efficiency of our proposed system, we offer real-time computational transaction times, making our solution relevant for practical applications.
虹膜生物识别模板保护的后量子安全两方计算
考虑到生物识别数据的保护,未来使用量子计算机的攻击需要生物识别验证系统的足够抵抗。这类系统通常是长期部署的,由于它们所包含的数据的敏感性和持久性,应该得到强有力的保护。为了实现高效的模板保护,我们将后量子安全两方计算与秘密共享相结合,应用了第一个实际实现的后量子安全两方计算协议来保护生物特征模板。该系统确保了模板在加密域中存储和比较时对生物特征数据的永久保护。对于验证,我们提出了两种可以作为实时交易实现的选项:一个成熟的经典两方计算方案或该方案的最近后量子升级。这两种方法都保持了完全的生物识别性能。参考模板数据库是生物识别系统中攻击的目标,在这两种验证方案中都保持了后量子安全性。关于我们提出的系统的计算效率,我们提供了实时计算事务时间,使我们的解决方案与实际应用相关。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信