DocumentCode :
568991
Title :
SIPPA-2.0 - Secure information processing with privacy assurance (version 2.0)
Author :
Prakash, Aravind ; Krishnan, Karthikeyan ; Sy, B.K.
Author_Institution :
Queens Coll., Dept. of Comput. Sci., CUNY, New York, NY, USA
fYear :
2012
fDate :
16-18 July 2012
Firstpage :
25
Lastpage :
34
Abstract :
We present a two-party secure information processing protocol referred to as SIPPA-2.0 - targeted towards privacy preserving biometric data comparison and reconstruction. The original intention of SIPPA as reported previously is to enable private data comparison and reconstruction between a client and a server when (a) the client possesses some data that are “sufficiently similar” to that of the server, and (b) the server provides a scalar helper data to facilitate private data reconstruction by the client. In SIPPA-2.0, private data comparison and reconstruction are based on new theoretical results and a novel secure computation protocol referred to as SLSSP. These new results allow us to design and develop the much improved SIPPA and SLSSP protocols guaranteeing (a) security under semi-malicious model rather than just semi-honest model, and (b) privacy assurance with arbitrary reconstruction accuracy controllable by the server. Security analysis proving SLSSP secure under the semi-honest and semi-malicious models is presented. SIPPA-2.0 is applied to enable privacy preserving fingerprint comparison; where two parties can compare their fingerprint samples and can obtain a similarity score without revealing their raw fingerprint to each other. Experimental results on the accuracy of fingerprint matching and the run-time performance are also reported.
Keywords :
client-server systems; cryptographic protocols; data privacy; fingerprint identification; SIPPA protocols; SIPPA-2.0; SLSSP protocols; arbitrary reconstruction accuracy; client-server system; fingerprint matching accuracy; privacy preserving biometric data; privacy preserving fingerprint comparison; private data comparison; private data reconstruction; run-time performance; scalar helper data; secure information processing with privacy assurance; secure linear system solution protocol; semihonest models; semimalicious model; similarity score; two-party secure information processing protocol; Cryptography; Data privacy; Fingerprint recognition; Privacy; Protocols; Servers; Vectors;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Privacy, Security and Trust (PST), 2012 Tenth Annual International Conference on
Conference_Location :
Paris
Print_ISBN :
978-1-4673-2323-9
Electronic_ISBN :
978-1-4673-2325-3
Type :
conf
DOI :
10.1109/PST.2012.6297916
Filename :
6297916
Link To Document :
بازگشت