ABSTRACT
In this paper, we apply verifiable computing techniques to a biometric matching. The purpose of verifiable computation is to give the result of a computation along with a proof that the calculations were correctly performed. We adapt a protocol called sumcheck protocol and present a system that performs verifiable biometric matching in the case of a fast border control. This is a work in progress and we focus on verifying an inner product. We then give some experimental results of its implementation. Verifiable computation here helps to enforce the authentication phase bringing in the process a proof that the biometric verification has been correctly performed.
- S. Arora and B. Barak. Computational Complexity: A Modern Approach. Cambridge University Press, New York, NY, USA, 2009. Google ScholarDigital Library
- M. J. Atallah, K. B. Frikken, M. T. Goodrich, and R. Tamassia. Financial Cryptography and Data Security: 9th International Conference, chapter Secure Biometric Authentication for Weak Computational Devices. Springer Berlin Heidelberg, 2005. Google ScholarDigital Library
- B. Parno, J. Howell, C. Gentry, and M. Raykova. Pinocchio: Nearly practical verifiable computation. In 2013 IEEE Symposium on Security and Privacy, 2013. Google ScholarDigital Library
- F. Schroff, D. Kalenichenko, and J. Philbin. Facenet: A unified embedding for face recognition and clustering. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2015.Google ScholarCross Ref
- J. Thaler. Time-optimal interactive proofs for circuit evaluation. In Advances in Cryptology-CRYPTO 2013. Proceedings, pages 71--89. Springer Berlin Heidelberg, 2013.Google Scholar
- R. S. Wahby, S. Setty, Z. Ren, A. J. Blumberg, and M. Walfish. Efficient RAM and control flow in verifiable outsourced computation. In NDSS, 2015.Google ScholarCross Ref
Index Terms
- Study of a Verifiable Biometric Matching
Recommendations
A review on performance,security and various biometric template protection schemes for biometric authentication systems
AbstractIdentifying a person based on their behavioral and biological qualities in an automated manner is called biometrics. The authentication system substituting traditional password and token for authentication and relies gradually on biometric ...
A novel biometric system based on palm vein image
Vein pattern recognition is one of the newest biometric techniques researched today. In this paper, one of the reliable and robust personal identification authentication approaches using palm vein patterns is presented. We consider the palm vein as a ...
Efficient yet robust biometric iris matching on smart cards for data high security and privacy
Smart control access to any service and/or critical data is at the very basis of any smart project. Biometrics have been used as a solution for system access control, for many years now. However, the simple use of biometrics cannot be considered as ...
Comments