private fingerprint matching
play

Private Fingerprint Matching Siamak F Shahandashti Reihaneh - PowerPoint PPT Presentation

Private Fingerprint Matching Siamak F Shahandashti Reihaneh Safavi-Naini Philip Ogunbona Uni of Wollongong & Uni of Calgary ACISP 2012 SF Shahandashti, R Safavi-Naini, P Ogunbona Private Fingerprint Matching Fingerprint Matching: from


  1. Private Fingerprint Matching Siamak F Shahandashti Reihaneh Safavi-Naini Philip Ogunbona Uni of Wollongong & Uni of Calgary ACISP 2012 SF Shahandashti, R Safavi-Naini, P Ogunbona Private Fingerprint Matching

  2. Fingerprint Matching: from Algorithm to Private Protocol Usage of biometrics (esp. fingerprints ) for authentication increasing rapidly SF Shahandashti, R Safavi-Naini, P Ogunbona Private Fingerprint Matching

  3. Fingerprint Matching: from Algorithm to Private Protocol Usage of biometrics (esp. fingerprints ) for authentication increasing rapidly System heart: fingerprint matching algorithm SF Shahandashti, R Safavi-Naini, P Ogunbona Private Fingerprint Matching

  4. Fingerprint Matching: from Algorithm to Private Protocol Usage of biometrics (esp. fingerprints ) for authentication increasing rapidly System heart: fingerprint matching algorithm Often 2 fingerprints held by 2 separate entities not willing to share unnecessary information SF Shahandashti, R Safavi-Naini, P Ogunbona Private Fingerprint Matching

  5. Fingerprint Matching: from Algorithm to Private Protocol Usage of biometrics (esp. fingerprints ) for authentication increasing rapidly System heart: fingerprint matching algorithm Often 2 fingerprints held by 2 separate entities not willing to share unnecessary information Hence, a need for protocols that enable 2 parties decide if their fingerprints match without revealing any further info SF Shahandashti, R Safavi-Naini, P Ogunbona Private Fingerprint Matching

  6. Fingerprint Matching: from Algorithm to Private Protocol Usage of biometrics (esp. fingerprints ) for authentication increasing rapidly System heart: fingerprint matching algorithm Often 2 fingerprints held by 2 separate entities not willing to share unnecessary information Hence, a need for protocols that enable 2 parties decide if their fingerprints match without revealing any further info Let’s call it a private fingerprint matching protocol SF Shahandashti, R Safavi-Naini, P Ogunbona Private Fingerprint Matching

  7. Fingerprint Matching Algorithms The most widely-used method for fingerprint matching [HFR]: extraction of features called minutiae , comparing them based on their types , locations , and orientations , and deciding based on the number of matching pairs of minutiae F = { p 1 , . . . , p n } p i = ( t i , x i , y i , θ i ) [Keogh ′ 01] SF Shahandashti, R Safavi-Naini, P Ogunbona Private Fingerprint Matching

  8. Previous Works vs. Ours Shortcomings of previous works: Over-simplification Private Hamming distance calculation Under-performance Private matching as images, e.g. FingerCode Genericness Private matching based on generic multiparty computation SF Shahandashti, R Safavi-Naini, P Ogunbona Private Fingerprint Matching

  9. Previous Works vs. Ours Shortcomings of previous works: Over-simplification Private Hamming distance calculation Under-performance Private matching as images, e.g. FingerCode Genericness Private matching based on generic multiparty computation Our proposal: concrete private protocol for full minutiae matching method SF Shahandashti, R Safavi-Naini, P Ogunbona Private Fingerprint Matching

  10. Previous Works vs. Ours Shortcomings of previous works: Over-simplification Private Hamming distance calculation Under-performance Private matching as images, e.g. FingerCode Genericness Private matching based on generic multiparty computation Our proposal: concrete private protocol for full minutiae matching method using homomorphic encryption E( a + b ) = E( a ) ⊕ E( b ) SF Shahandashti, R Safavi-Naini, P Ogunbona Private Fingerprint Matching

  11. Main Idea Homomorphic encryption enables the computation of E ( P ( x )) from E( x ) through interaction with the holder of the decryption key: Calculate E ( rx ) and send � ( rx ) i � � ( rx ) i � Decrypt, calculate , encrypt again to E and send � ( rx ) i � Calculate E ( P ( x )) using E SF Shahandashti, R Safavi-Naini, P Ogunbona Private Fingerprint Matching

  12. The Protocol Flow Define the following polynomials via Lagrange interpolation: Q i ( t j ) equals 0 if t j = t i and 1 otherwise Q E ( d 2 ij ) equals 0 if d ij is less than the threshold and 1 otherwise Q a ( γ ij ) equals 0 if γ ij is less than the threshold and 1 otherwise A party receiving an encrypted version of the minutiae of the other party SF Shahandashti, R Safavi-Naini, P Ogunbona Private Fingerprint Matching

  13. The Protocol Flow Define the following polynomials via Lagrange interpolation: Q i ( t j ) equals 0 if t j = t i and 1 otherwise Q E ( d 2 ij ) equals 0 if d ij is less than the threshold and 1 otherwise Q a ( γ ij ) equals 0 if γ ij is less than the threshold and 1 otherwise A party receiving an encrypted version of the minutiae of the other party can compute the encrypted versions of the above polynomials SF Shahandashti, R Safavi-Naini, P Ogunbona Private Fingerprint Matching

  14. The Protocol Flow Define the following polynomials via Lagrange interpolation: Q i ( t j ) equals 0 if t j = t i and 1 otherwise Q E ( d 2 ij ) equals 0 if d ij is less than the threshold and 1 otherwise Q a ( γ ij ) equals 0 if γ ij is less than the threshold and 1 otherwise A party receiving an encrypted version of the minutiae of the other party can compute the encrypted versions of the above polynomials and sum them up to compute an encryption of z ij = Q i ( t j ) + Q E ( d 2 ij ) + Q a ( γ ij ) SF Shahandashti, R Safavi-Naini, P Ogunbona Private Fingerprint Matching

  15. The Protocol Flow (cont’d) Similarly, define the following polynomials via Lagrange interpolation: R ( z ij ) equals 1 if z ij = 0 and 0 otherwise Then an encryption of R ( z ij ) can be calculated which is 1 if p i and p j match. SF Shahandashti, R Safavi-Naini, P Ogunbona Private Fingerprint Matching

  16. The Protocol Flow (cont’d) Similarly, define the following polynomials via Lagrange interpolation: R ( z ij ) equals 1 if z ij = 0 and 0 otherwise Then an encryption of R ( z ij ) can be calculated which is 1 if p i and p j match. Then an encryption of the count of minutiae matchings can be calculated and thresholded similarly and we are done! SF Shahandashti, R Safavi-Naini, P Ogunbona Private Fingerprint Matching

  17. Security and Practicality Full privacy against honest-but-curious adversaries proven SF Shahandashti, R Safavi-Naini, P Ogunbona Private Fingerprint Matching

  18. Security and Practicality Full privacy against honest-but-curious adversaries proven Full privacy against malicious adversaries achievable via standard techniques SF Shahandashti, R Safavi-Naini, P Ogunbona Private Fingerprint Matching

  19. Security and Practicality Full privacy against honest-but-curious adversaries proven Full privacy against malicious adversaries achievable via standard techniques Typical fingerprints can be compared at the expense of around a hundred encryptions. SF Shahandashti, R Safavi-Naini, P Ogunbona Private Fingerprint Matching

  20. Security and Practicality Full privacy against honest-but-curious adversaries proven Full privacy against malicious adversaries achievable via standard techniques Typical fingerprints can be compared at the expense of around a hundred encryptions. Full paper: eprint.iacr.org/2012/219 SF Shahandashti, R Safavi-Naini, P Ogunbona Private Fingerprint Matching

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend