Extended Private Information Retrieval and Its Application in Biometrics Authentications
نویسندگان
چکیده
In this paper we generalize the concept of Private Information Retrieval (PIR) by formalizing a new cryptographic primitive, named Extended Private Information Retrieval (EPIR). Instead of enabling a user to retrieve a bit (or a block) from a database as in the case of PIR, an EPIR protocol enables a user to evaluate a function f which takes a string chosen by the user and a block from the database as input. Like PIR, EPIR can also be considered as a special case of the secure two-party computation problem (and more specifically the oblivious function evaluation problem). We propose two EPIR protocols, one for testing equality and the other for computing Hamming distance. As an important application, we show how to construct strong privacy-preserving biometric-based authentication schemes by employing these EPIR protocols.
منابع مشابه
Network Security Analysis Based on Authentication Techniques
Network Security issues are now becoming important as society is moving to digital information age. Data security is the utmost critical component in ensuring safe transmission of information through the internet. It comprises authorization of access to information in a network, controlled by the network administrator. The task of Network security not only requires ensuring the security of end ...
متن کاملOn the Security of O-PSI a Delegated Private Set Intersection on Outsourced Datasets (Extended Version)
In recent years, determining the common information privately and efficiently between two mutually mistrusting parties have become an important issue in social networks. Many Private set intersection (PSI) protocols have been introduced to address this issue. By applying these protocols, two parties can compute the intersection between their sets without disclosing any information about compone...
متن کاملTesting and Validating the Role of Interactive Information Retrieval Model in Faculty Members' psychological Enabling: A Case Study of Alborz University of Medical Sciences
The term "electromagnetic fields" (EMF) is a combination of electric and magnetic fields as a diagnostic method as well as a therapeutic tool with many advantages such as ease of operation and painlessness, very controllable, which today has found wide application in regenerative medicine and also cancer treatment. In addition to organs such as nerves, hearts, and bones that have an electrica...
متن کاملUnobservable communication over fully untrusted infrastructure ( extended
Keeping communication private has become increasingly important in an era of mass surveillance and statesponsored attacks. While hiding the contents of a conversation has well-known solutions, hiding the associated metadata (participants, duration, etc.) remains a challenge, especially if one cannot trust ISPs or proxy servers. This paper describes a communication system called Pung that provab...
متن کاملUnobservable communication over fully untrusted infrastructure ( extended version ) ⋆
Keeping communication private has become increasingly important in an era of mass surveillance and statesponsored attacks. While hiding the contents of a conversation has well-known solutions, hiding the associated metadata (participants, duration, etc.) remains a challenge, especially if one cannot trust ISPs or proxy servers. This paper describes a communication system called Pung that provab...
متن کامل