Delegating Biometric Authentication with the Sumcheck Protocol

Abstract : In this paper, we apply the Sumcheck protocol to verify the Euclidean (resp. Hamming) distance computation in the case of facial (resp. iris) recognition. In particular, we consider a border crossing use case where, thanks to an interactive protocol, we delegate the authentication to the traveller. Verifiable computation aims to give the result of a computation and a proof of its correctness. In our case, the traveller takes over the authentication process and makes a proof that he did it correctly leaving to the authorities to check its validity. We integrate privacy preserving techniques to avoid that an eavesdropper gets information about the biometric data of the traveller during his interactions with the authorities. We provide implementation figures for our proposal showing that it is practical.
Type de document :
Communication dans un congrès
Sara Foresti; Javier Lopez. 10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. Springer International Publishing, Lecture Notes in Computer Science, LNCS-9895, pp.236-244, 2016, Information Security Theory and Practice. 〈10.1007/978-3-319-45931-8_15〉
Liste complète des métadonnées

Littérature citée [25 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/hal-01639622
Contributeur : Hal Ifip <>
Soumis le : lundi 20 novembre 2017 - 14:54:29
Dernière modification le : lundi 20 novembre 2017 - 14:56:03

Fichier

 Accès restreint
Fichier visible le : 2019-01-01

Connectez-vous pour demander l'accès au fichier

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Hervé Chabanne, Julien Keuffer, Roch Lescuyer. Delegating Biometric Authentication with the Sumcheck Protocol. Sara Foresti; Javier Lopez. 10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. Springer International Publishing, Lecture Notes in Computer Science, LNCS-9895, pp.236-244, 2016, Information Security Theory and Practice. 〈10.1007/978-3-319-45931-8_15〉. 〈hal-01639622〉

Partager

Métriques

Consultations de la notice

50