A lattice-based approach to privacy-preserving biometric authentication without relying on trusted third parties

Trung Dinh, Ron Steinfeld, Nandita Bhattacharjee

    Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

    Abstract

    We propose a two-factor authentication protocol that uses a cryptographic authentication factor (secret key) to add biometric template privacy security against server exposure attack, to any given (non-private, one-factor) biometric authentication scheme based on Hamming-Distance (HD) comparison of stored and queried binary biometric templates. Our protocol provides provable privacy under the hardness of a standard cryptographic lattice problem (Ring-LWE), and provable two-factor impersonation security under malicious client model.

    Original languageEnglish
    Title of host publicationInformation Security Practice and Experience
    Subtitle of host publication13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017 - Proceedings
    EditorsJoseph K. Liu, Pierangela Samarati
    Place of PublicationCham Switzerland
    PublisherSpringer
    Pages297-319
    Number of pages23
    ISBN (Electronic)9783319723594
    ISBN (Print)9783319723587
    DOIs
    Publication statusPublished - 2017
    EventInformation Security Practice and Experience Conference 2017 - Deakin Downtown, Melbourne, Australia
    Duration: 13 Dec 201715 Dec 2017
    Conference number: 13th
    http://nsclab.org/ispec2017/

    Publication series

    NameLecture Notes in Computer Science
    PublisherSpringer
    Volume10701
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Conference

    ConferenceInformation Security Practice and Experience Conference 2017
    Abbreviated titleISPEC 2017
    CountryAustralia
    CityMelbourne
    Period13/12/1715/12/17
    Internet address

    Cite this

    Dinh, T., Steinfeld, R., & Bhattacharjee, N. (2017). A lattice-based approach to privacy-preserving biometric authentication without relying on trusted third parties. In J. K. Liu, & P. Samarati (Eds.), Information Security Practice and Experience: 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017 - Proceedings (pp. 297-319). (Lecture Notes in Computer Science; Vol. 10701). Springer. https://doi.org/10.1007/978-3-319-72359-4_17