Efficient Privacy-Preserving Biometric Identification Yan Huang - - PowerPoint PPT Presentation

efficient privacy preserving biometric identification
SMART_READER_LITE
LIVE PREVIEW

Efficient Privacy-Preserving Biometric Identification Yan Huang - - PowerPoint PPT Presentation

Efficient Privacy-Preserving Biometric Identification Yan Huang Lior Malka David Evans Jonathan Katz http://www.mightbeevil.org/secure-biometrics/ Feb 9, 2011 Motivating Scenario: Private No-Fly Checking Threat Models Semi-honest adversary


slide-1
SLIDE 1

Efficient Privacy-Preserving Biometric Identification

Yan Huang Lior Malka David Evans Jonathan Katz

http://www.mightbeevil.org/secure-biometrics/ Feb 9, 2011

slide-2
SLIDE 2

Motivating Scenario: Private No-Fly Checking

slide-3
SLIDE 3

Threat Models

Semi-honest adversary

Must follow the protocol correctly

Malicious adversary

Can deviate arbitrarily from the protocol

In both threat models, an adversary attempts to break either the correctness or the privacy property of the protocol.

slide-4
SLIDE 4

Threat Models

Semi-honest adversary

Must follow the protocol correctly

Malicious adversary

Can deviate arbitrarily from the protocol

In both threat models, an adversary attempts to break either the correctness or the privacy property of the protocol.

slide-5
SLIDE 5

Filterbank-based Fingerprint Recognition [Jain et al., 2000]

Also used by Barni et al. [2010].

slide-6
SLIDE 6

Non-private Protocol

slide-7
SLIDE 7

Privacy-preserving Protocol

slide-8
SLIDE 8

Privacy-preserving Protocol

slide-9
SLIDE 9

Euclidean Distance

Let di be the distance between vi = [vi,j]1≤j≤N and v′ = [v′

j]1≤j≤N

di = vi − v′2 =

N

j=1

(vi,j − v′

j)2

=

N

j=1

v2

i,j

Si,1

+

N

j=1

(−2vi,j · v′

j)

  • Si,2

+

N

j=1

v′

j 2

S3 For privacy, want to compute dipk.

slide-10
SLIDE 10

Additive Homomorphic Encryption apk bpk

       = ⇒ a + b mod ppk = apk · bpk

apk c

       = ⇒ c · a mod ppk = ac

pk

We used Paillier cryptosystem [Catalano et al., 2001, Paillier, 1999] in our prototype.

slide-11
SLIDE 11

Additive Homomorphic Encryption a b

       = ⇒ a + b mod p = a · b

a c

       = ⇒ c · a mod p = ac We used Paillier cryptosystem [Catalano et al., 2001, Paillier, 1999] in our prototype.

slide-12
SLIDE 12

Private Euclidean Distance

di =

  • N

j=1

v2

i,j

Si,1 +

N

j=1

(−2vi,jv′

j)

  • Si,2

+

N

j=1

v′

j 2

S3

  • = Si,1 · Si,2 · S3

Si,2 =

  • N

j=1

(−2vi,jv′

j)

  • =

N

j=1

−2vi,j v′

j

slide-13
SLIDE 13

Improving the Efficiency

Modular exponentiation is slow. For every i, computing Si,2 requires N modular exponentiations. Overall, it involves MN modular exponentiations Encode many messages in one homomorphic encryption Packing was introduced by Sadeghi et al. [2009] to save bandwidth, but is exploited more aggressively here to save computation also.

slide-14
SLIDE 14

Padding 0’s to Ensure Correctness

slide-15
SLIDE 15

Vertical Partitioning to Speedup Computing Si,2

Si,2 =

N

j=1

−2vi,j v′

j

        

−2v1,1 −2v1,2 · · · −2v1,N −2v2,1 −2v2,2 · · · −2v2,N

. . . . . . ... . . .

−2vκ,1 −2vκ,2 · · · −2vκ,N

        

slide-16
SLIDE 16

Vertical Partitioning to Speedup Computing Si,2

Si,2 =

N

j=1

−2vi,j v′

j

S1,2S2,2 · · · Sκ,2 = ∏

1≤j≤N

  • −2v1,jv′

j−2v2,jv′ j · · · −2vκ,jv′ j

       

−2v1,1 −2v1,2 · · · −2v1,N −2v2,1 −2v2,2 · · · −2v2,N

. . . . . . ... . . .

−2vκ,1 −2vκ,2 · · · −2vκ,N

        

slide-17
SLIDE 17

Vertical Partitioning to Speedup Computing Si,2

Si,2 =

N

j=1

−2vi,j v′

j

S1,2S2,2 · · · Sκ,2 = ∏

1≤j≤N

  • −2v1,jv′

j−2v2,jv′ j · · · −2vκ,jv′ j

  • −2v1,jv′

j−2v2,jv′ j · · · −2vκ,jv′ j

  • =

−2v1,j−2v2,j · · · −2vκ,j v′

j

        

−2v1,1 −2v1,2 · · · −2v1,N −2v2,1 −2v2,2 · · · −2v2,N

. . . . . . ... . . .

−2vκ,1 −2vκ,2 · · · −2vκ,N

        

slide-18
SLIDE 18

Vertical Partitioning to Speedup Computing Si,2

Si,2 =

N

j=1

−2vi,j v′

j

S1,2S2,2 · · · Sκ,2 = ∏

1≤j≤N

  • −2v1,jv′

j−2v2,jv′ j · · · −2vκ,jv′ j

  • −2v1,jv′

j−2v2,jv′ j · · · −2vκ,jv′ j

  • =

−2v1,j−2v2,j · · · −2vκ,j v′

j

        

−2v1,1 −2v1,2 · · · −2v1,N −2v2,1 −2v2,2 · · · −2v2,N

. . . . . . ... . . .

−2vκ,1 −2vκ,2 · · · −2vκ,N

        

slide-19
SLIDE 19

Effects of Packing

15 20 25 30 35 40 45 50 55 60 65 Time Bandwidth

slide-20
SLIDE 20

Sharing the Secrets

The server generates nonce masks r = [r1, r2, · · · , rM] and sends

  • d′

1 · · · d′ M

  • pk = (d1 + r1)(d2 + r2) · · · (dM + rM)pk

where pk is the client’s public key. Make the sampling range of ri large enough so that d′

i and di is statistically indistinguishable.

slide-21
SLIDE 21

Privacy-preserving Protocol

slide-22
SLIDE 22

Garbled Circuits Protocol

Efficient oblivious transfer protocol combining schemes from both [Naor and Pinkas, 2001] and [Ishai et al., 2003] Standard garbled circuits [Yao, 1986] combined with free-XOR technique [Kolesnikov and Schneider, 2008]

slide-23
SLIDE 23

Finding the Minimum Differnce

Goal

Given d′ = d + r and r, securely compute d∗ = min

1≤i≤M(di, ε).

slide-24
SLIDE 24

Reducing the Bit-width

Saves 2M(ℓ − k) non-free gates in total.

slide-25
SLIDE 25

Privacy-preserving Protocol

slide-26
SLIDE 26

Finding the Record

Ultimate goal is to retrieve the record associated with d∗ Prior work [Kolesnikov et al., 2009] accomplished this by relaying indices throughout the M-to-1 Min circuit We achieve this with a backtracking protocol

1

No need to propagate ID numbers

2

Obtain record without an extra secure information retrieval by ID

3

Use labels obtained in garbled circuit execution

slide-27
SLIDE 27

The 2-to-1 Min

slide-28
SLIDE 28

Mini Example — The Server

slide-29
SLIDE 29

Mini Example — The Server

slide-30
SLIDE 30

Selection Wires in the M-to-1 Min Tree

slide-31
SLIDE 31

Backtracking — The Sender

n1, n2, n3 are random nonces known

  • nly to the sender.
slide-32
SLIDE 32

Backtracking — The Receiver

slide-33
SLIDE 33

Backtracking — The Receiver

Client knows λ0

ε, λ0 1, λ1 2, λ0 3 from circuit evaluation,

slide-34
SLIDE 34

Backtracking — The Receiver

Client knows λ0

ε, λ0 1, λ1 2, λ0 3 from circuit evaluation, so

is able to infer n1

slide-35
SLIDE 35

Backtracking — The Receiver

Client knows λ0

ε, λ0 1, λ1 2, λ0 3 from circuit evaluation, so

is able to infer n1, n2

slide-36
SLIDE 36

Backtracking — The Receiver

Client knows λ0

ε, λ0 1, λ1 2, λ0 3 from circuit evaluation, so

is able to infer n1, n2, and Radu.

slide-37
SLIDE 37

System Recap

slide-38
SLIDE 38

Results — Online Performance

2 4 6 8 10 12 14 16 18 1000 2000 3000 4000 5000 6000 7000 8000

Distance OT Circuit Backtracking

4.6× faster and uses 58% less bandwidth than Barni et al. [2010], even though we compute the global minimum

slide-39
SLIDE 39

Thank you!

Software available for download at: http://www.mightbeevil.org/secure-biometrics/

slide-40
SLIDE 40

References I

Mauro Barni, Tiziano Bianchi, Dario Catalano, Mario Di Raimondo, Ruggero Donida Labati, Pierluigi Faillia, D. Fiore, R. Lazzeretti, V. Piuri, F. Scotti, and A. Piva. Privacy-Preserving Fingercode Authentication. In ACM Multimedia and Security Workshop, 2010. Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham, and Phong Nguyen. Paillier’s Cryptosystem Revisited. In ACM Conference on Computer and Communications Security, 2001. Yuval Ishai, Joe Kilian, Kobbi Nissim, and Erez Petrank. Extending Oblivious Transfers

  • Efficiently. In CRYPTO, 2003.

Anil Jain, Salil Prabhakar, Lin Hong, and Sharath Pankanti. Filterbank-based Fingerprint

  • Matching. IEEE Transactions on Image Processing, pages 846–859, January 2000.

Vladimir Kolesnikov and Thomas Schneider. Improved Garbled Circuit: Free XOR Gates and

  • Applications. In International Colloquium on Automata, Languages and Programming, 2008.

Vladimir Kolesnikov, Ahmad-Reza Sadeghi, and Thomas Schneider. Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. In International Conference on Cryptology and Network Security, 2009. Moni Naor and Benny Pinkas. Efficient Oblivious Transfer Protocols. In ACM-SIAM Symposium

  • n Discrete Algorithms, 2001.

Pascal Paillier. Public-key Cryptosystems based on Composite Degree Residuosity Classes. EUROCRYPT, 1999. Ahmad-Reza Sadeghi, Thomas Schneider, and Immo Wehrenberg. Efficient Privacy-Preserving Face Recognition. In International Conference on Information Security and Cryptology, 2009. Andrew Yao. How to Generate and Exchange Secrets. In Symposium on Foundations of Computer Science, 1986.