http://iet.metastore.ingenta.com
1887

Privacy-preserving distance computation for IrisCodes

Privacy-preserving distance computation for IrisCodes

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Iris and Periocular Biometric Recognition — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In this chapter, we describe how to perform a secure and efficient IrisCode-based identification. In this use case, the first party has an IrisCode, the second party has one or several IrisCodes and they would like to discover whether the first party's IrisCode is close to at least one IrisCode belonging to the second party without revealing any information about their own IrisCodes to the opposing party. Secure Two-Party Computation (S2PC) protocols are dedicated to this use case because they enable two parties to jointly evaluate a function over their inputs while preserving the privacy of their inputs. In this chapter, we explain how to efficiently use S2PC protocols for secure iris-based identification.

Chapter Contents:

  • 15.1 Introduction
  • 15.2 Secure distance computation in the semi-honest model
  • 15.2.1 Oblivious transfer
  • 15.2.2 Yao's garbled circuits
  • 15.2.3 GSHADE in the semi-honest model
  • 15.2.4 Privacy-preserving distance computation for IrisCodes in the semi-honest model
  • 15.2.4.1 Authentication in the semi-honest setting
  • 15.2.4.2 Identification in the semi-honest setting
  • 15.2.4.3 Performance
  • 15.3 Secure distance computation in the malicious model
  • 15.3.1 Yao's garbled circuits in the malicious setting
  • 15.3.1.1 The cut-and-choose construction
  • 15.3.1.2 The DualEx technique
  • 15.3.2 GSHADE in the malicious setting
  • 15.3.3 Privacy-preserving distance computation for IrisCodes in the malicious model
  • 15.3.3.1 Authentication in the malicious setting
  • 15.3.3.2 Identification in the malicious setting
  • 15.3.3.3 Performance
  • 15.4 Application to other iris representations
  • 15.5 Conclusion
  • Acknowledgments
  • References

Inspec keywords: cryptographic protocols; iris recognition

Other keywords: IrisCode-based identification; S2PC protocols; secure two-party computation protocols; privacy-preserving distance computation

Subjects: Image recognition; Cryptography; Computer vision and image processing techniques; Protocols; Data security

Preview this chapter:
Zoom in
Zoomout

Privacy-preserving distance computation for IrisCodes, Page 1 of 2

| /docserver/preview/fulltext/books/sc/pbse005e/PBSE005E_ch15-1.gif /docserver/preview/fulltext/books/sc/pbse005e/PBSE005E_ch15-2.gif

Related content

content/books/10.1049/pbse005e_ch15
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address