Privacy-preserving biometrics authentication systems using fully homomorphic encryption

Wilson Abel Alberto Torres, Nandita Bhattacharjee, Balasubramaniam Srinivasan

    Research output: Contribution to journalArticleResearchpeer-review

    7 Citations (Scopus)


    Purpose - The purpose of this paper is to determine the effectiveness of using fully homomorphic encryption (FHE) to preserve the privacy of biometric data in an authentication system. Biometrics offers higher accuracy for personal recognition than traditional methods because of its properties. Biometric data are permanently linked with anindividual and cannot be revokedor cancelled, especially when biometric data are compromised, leading to privacy issues. Design/methodology/approach ? By reviewing current approaches, FHE is considered as a promising solution for the privacy issue because of its ability to perform computations in the encrypted domain. The authors studied the effectiveness of FHE in biometric authentication systems. In doing so, the authors undertake the study by implementing a protocol for biometric authentication system using iris. Findings ? The security analysis of the implementation scheme demonstrates the effectiveness of FHE to protect the privacy of biometric data, as unlimited operations can be performed in the encrypted domain, and the FHE secret key is not shared with any other party during the authentication protocol. Research limitations/implications ? The use of malicious model in the design of the authentication protocol to improve the privacy, packing methods and use of low-level programming language to enhance performance of the system needs to be further investigated. Originality/value - The main contributions of this paper are the implementation of a privacy-preserving iris biometric authentication protocol adapted to lattice-based FHE and a sound security analysis of authentication and privacy.
    Original languageEnglish
    Pages (from-to)151 - 168
    Number of pages18
    JournalInternational Journal of Pervasive Computing and Communications
    Issue number2
    Publication statusPublished - 2015

    Cite this