Cryptology ePrint Archive: Report 2010/627
Secure and Efficient Protocols for Iris and Fingerprint Identification
Marina Blanton and Paolo Gasti
Abstract: Recent advances in biometric recognition and the increasing use of biometric
data prompt significant privacy challenges associated with the possible
misuse, loss or theft, of biometric data. Biometric matching is often
performed by two mutually suspicious parties, one of which holds one
biometric image while the other owns a possibly large biometric collection.
Due to privacy and liability considerations, neither party is willing to
share its data. This gives rise to the need to develop secure computation
techniques over biometric data where no information is revealed to the
parties except the outcome of the comparison or search. To address the
problem, in this work we develop and implement the first privacy-preserving
identification protocol for iris codes. We also design and implement a
secure protocol for fingerprint identification based on FingerCodes with a
substantial improvement in the performance compared to existing solutions.
We show that new techniques and optimizations employed in this work allow us
to achieve particularly efficient protocols suitable for large data sets and
obtain notable performance gain compared to the state-of-the-art prior work.
Category / Keywords: cryptographic protocols / secure biometric computation, two-party protocols, implementation
Publication Info: Full version of paper that appears at ESORICS'11.
Date: received 8 Dec 2010, last revised 16 Sep 2011
Contact author: mblanton at nd edu
Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation
Version: 20110917:024955 (All versions of this report)
Short URL: ia.cr/2010/627
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]