TY - JOUR
T1 - Secure Hamming distance computation for biometrics using ideal-lattice and ring-LWE homomorphic encryption
AU - Yasuda, Masaya
N1 - Funding Information:
This work was supported by the Japan Society for the Promotion of Science (JSPS) KAKENHI Grant number 16H02830.
Publisher Copyright:
© 2017 Taylor & Francis.
PY - 2017/3/4
Y1 - 2017/3/4
N2 - With widespread development of biometrics, concerns about security and privacy are rapidly increasing. Homomorphic encryption enables us to operate on encrypted data without decryption, and it can be applied to construct a privacy-preserving biometric system. In this article, we apply two homomorphic encryption schemes based on ideal-lattice and ring-LWE (Learning with Errors), which both have homomorphic correctness over the ring of integers of a cyclotomic field. We compare the two schemes in applying them to privacy-preserving biometrics. In biometrics, the Hamming distance is used as a metric to compare two biometric feature vectors for authentication. We propose an efficient method for secure Hamming distance. Our method can pack a biometric feature vector into a single ciphertext, and it enables efficient computation of secure Hamming distance over our packed ciphertexts.
AB - With widespread development of biometrics, concerns about security and privacy are rapidly increasing. Homomorphic encryption enables us to operate on encrypted data without decryption, and it can be applied to construct a privacy-preserving biometric system. In this article, we apply two homomorphic encryption schemes based on ideal-lattice and ring-LWE (Learning with Errors), which both have homomorphic correctness over the ring of integers of a cyclotomic field. We compare the two schemes in applying them to privacy-preserving biometrics. In biometrics, the Hamming distance is used as a metric to compare two biometric feature vectors for authentication. We propose an efficient method for secure Hamming distance. Our method can pack a biometric feature vector into a single ciphertext, and it enables efficient computation of secure Hamming distance over our packed ciphertexts.
UR - http://www.scopus.com/inward/record.url?scp=85015646769&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85015646769&partnerID=8YFLogxK
U2 - 10.1080/19393555.2017.1293199
DO - 10.1080/19393555.2017.1293199
M3 - Article
AN - SCOPUS:85015646769
SN - 1939-3555
VL - 26
SP - 85
EP - 103
JO - Information Security Journal
JF - Information Security Journal
IS - 2
ER -