Privacy-Preserving Preselection for Protected Biometric Identification Using Public-Key Encryption with Keyword Search
نویسندگان
چکیده
The efficiency of biometric systems, in particular efficient and accurate identification, is one the most challenging open problems biometrics today. Adding to that, data are sensitive deserving adequate protection. As a solution, this work proposes an privacy-preserving reduction computational workload identification systems using public-key encryption with keyword search (PEKS). For long-term protection data, fully homomorphic applied for template all cryptographic schemes lattice-based, they also offer post-quantum security. Throughout system, recognition accuracy unprotected system preserved. In evaluation on public face database, encrypted domain reduced down 8.4% compared exhaustive search, achieving 1062 subjects 210 milliseconds. Based these results, 1 million can be estimated at under 3 minutes off-the-shelf hardware.
منابع مشابه
Public Key Encryption with Keyword Search Revisited
The public key encryption with keyword search (PEKS) scheme recently proposed by Boneh, Di Crescenzo, Ostrovsky, and Persiano enables one to search encrypted keywords without compromising the security of the original data. In this paper, we address three important issues of a PEKS scheme, “refreshing keywords”, “removing secure channel”, and “processing multiple keywords”, which have not been c...
متن کاملPublic Key Encryption with Keyword Search
We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice’s public key. An email gateway wants to test whether the email contains the keyword “urgent” so that it could route the email accordingly. Alice, on the other hand does not wish to give the gateway the ability to decrypt all her messages. W...
متن کاملPublic-Key Encryption with Registered Keyword Search
Public-key Encryption with Keyword Search (PEKS) enables a server to test whether a tag from a sender and a trapdoor from a receiver contain the same keyword. In this paper, we highlight some potential security concern, i.e. a curious server is able to answer whether any selected keyword is corresponding to a given trapdoor or not (called an offline keyword guessing attack). The existing semant...
متن کاملGeneric Combination of Public Key Encryption with Keyword Search and Public Key Encryption
In this paper, we study the problem of secure integrating public key encryption with keyword search (PEKS) with public key data encryption (PKE). We argue the previous security model is not complete regarding keyword privacy and the previous constructions are secure only in the random oracle model. We solve these problems by first defining a new security model, then give a generic construction ...
متن کاملPost-Quantum Secure Public Key Broadcast Encryption with Keyword Search
In remote data storage system, the information privacy is the main concern of the users. Data confidentiality, keyword search and access control are important characteristics that should be supported in such system. With the advent of quantum computer, number theory related assumptions are vulnerable to quantum attack. In this context, we propose a post-quantum secure searchable encryption sche...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Industrial Informatics
سال: 2023
ISSN: ['1551-3203', '1941-0050']
DOI: https://doi.org/10.1109/tii.2022.3199944