SLIDE 15 15
Challenges in Evaluating BTP
- Many different BTP schemes in literature
– Some aliases for BTP:
- Helper Data Scheme (Philips), Pseudo Identities (TURBINE), Fuzzy
p ( p ), ( ), y commitment (RSA Lab), Cancelable Biometrics (IBM), Biometric encryption, Fuzzy Vault (RSA Lab), ), Shielding functions (Philips), Fuzzy extractors (NYU), BIOCRYPTICS (GenKey), Random Projection (Yonsei Univ.), Secure sketch (Polytech. Univ. NY), Secure Syndrome (Mitsubishi), …
– Lack of well-established metrics for evaluating BTP methods
– Develop metrics for ranking and independent benchmarking
3rd Edward van der Meulen Seminar
p g p g – NIST Federal Funding Opportunity ($200k support) – Project Partners
- KUL : Katholieke Universiteit Leuven, COSIC – Belgium
- GUC : Gjøvik University College, NISlab – Norway
– Previous collaboration in TURBINE project (evaluators)
29
Main Objectives
- Identification and selection of criteria that are relevant for the
evaluation of BTP (key properties to assess)
– How to define them consistently w.r.t. some reference architecture?
- Focus on criteria directly related to BTP
- Target criteria that are quantifiable or measurable in a precise way
- Categorize in three performance groups:
– Technical, protection and operational
– Try to come up with universal metrics that can be empirically evaluated
3rd Edward van der Meulen Seminar 30
- Results to be presented at ICB 2012
– Simoens, K., B. Yang, X. Zhou, F. Beato, C. Busch, E.M. Newton, and B.
- Preneel. 2012. Criteria Towards Metrics for Benchmarking Template
Protection Algorithms. ICB 2012.