Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3658664.3659633acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article
Open access

Monchi: Multi-scheme Optimization For Collaborative Homomorphic Identification

Published: 24 June 2024 Publication History
  • Get Citation Alerts
  • Abstract

    This paper introduces a novel protocol for privacy-preserving biometric identification, named Monchi, that combines the use of homomorphic encryption for the computation of the identification score with function secret sharing to obliviously compare this score with a given threshold and finally output the binary result. Given the cost of homomorphic encryption, BFV in this solution, we study and evaluate the integration of two packing solutions that enable the regrouping of multiple templates in one ciphertext to improve efficiency meaningfully. We propose an end-to-end protocol, prove it secure and implement it. Our experimental results attest to Monchi's applicability to the real-life use case of an airplane boarding scenario with 1000 passengers,taking less than one second to authorize/deny access to the plane to each passenger via biometric identification while maintaining the privacy of all passengers.

    References

    [1]
    Jean-Claude Bajard, Julien Eynard, M Anwar Hasan, and Vincent Zucca. 2016. A full RNS variant of FV like somewhat homomorphic encryption schemes., bibinfonumpages423--442 pages.
    [2]
    Mauro Barni, Tiziano Bianchi, Dario Catalano, Mario Di Raimondo, Ruggero Donida Labati, Pierluigi Failla, Dario Fiore, Riccardo Lazzeretti, Vincenzo Piuri, Alessandro Piva, et al. 2010. A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates., bibinfonumpages7 pages.
    [3]
    Marcelo Blatt, Alexander Gusev, Yuriy Polyakov, Kurt Rohloff, and Vinod Vaikuntanathan. 2020. Optimized homomorphic encryption solution for secure genome-wide association studies., bibinfonumpages13 pages.
    [4]
    Vishnu Naresh Boddeti. 2018. Secure face matching using fully homomorphic encryption., bibinfonumpages10 pages.
    [5]
    Elette Boyle, Nishanth Chandran, Niv Gilboa, Divya Gupta, Yuval Ishai, Nishant Kumar, and Mayank Rathee. 2021. Function secret sharing for mixed-mode and fixed-point secure computation., bibinfonumpages871--900 pages.
    [6]
    Elette Boyle, Niv Gilboa, and Yuval Ishai. 2015. Function secret sharing., bibinfonumpages337--367 pages.
    [7]
    Zvika Brakerski. 2012. Fully homomorphic encryption without modulus switching from classical GapSVP., bibinfonumpages868--886 pages.
    [8]
    Zvika Brakerski, Craig Gentry, and Vinod Vaikuntanathan. 2014. (Leveled) fully homomorphic encryption without bootstrapping., bibinfonumpages36 pages.
    [9]
    Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma, and Shardul Tripathi. 2019. EzPC: programmable and efficient secure two-party computation for machine learning., bibinfonumpages496--511 pages.
    [10]
    Jung Hee Cheon, Hyeongmin Choe, Alain Passelègue, Damien Stehlé, and Elias Suvanto. 2024. Attacks Against the INDCPA-D Security of Exact FHE Schemes. Cryptology ePrint Archive (2024).
    [11]
    Daniel Demmler, Thomas Schneider, and Michael Zohner. 2015. ABY-A framework for efficient mixed-protocol secure two-party computation., bibinfonumpages15 pages.
    [12]
    Léo Ducas and Daniele Micciancio. 2015. FHEW: bootstrapping homomorphic encryption in less than a second., bibinfonumpages617--640 pages.
    [13]
    Joshua J Engelsma, Anil K Jain, and Vishnu Naresh Boddeti. 2022. HERS: Homomorphically encrypted representation search., bibinfonumpages349--360 pages.
    [14]
    Junfeng Fan and Frederik Vercauteren. 2012. Somewhat practical fully homomorphic encryption.
    [15]
    Javier Galbally, Chris McCool, Julian Fierrez, Sebastien Marcel, and Javier Ortega-Garcia. 2010. On the vulnerability of face verification systems to hill-climbing attacks., bibinfonumpages1027--1038 pages.
    [16]
    Niv Gilboa and Yuval Ishai. 2014. Distributed point functions and their applications., bibinfonumpages640--658 pages.
    [17]
    Shai Halevi, Yuriy Polyakov, and Victor Shoup. 2019. An improved RNS variant of the BFV homomorphic encryption scheme., bibinfonumpages83--105 pages.
    [18]
    Gary B Huang, Marwan Mattar, Tamara Berg, and Eric Learned-Miller. 2008. Labeled faces in the wild: A database forstudying face recognition in unconstrained environments.
    [19]
    Alberto Ibarrondo, Hervé Chabanne, Vincent Despiegel, and Melek Önen. 2022b. Colmade: Collaborative masking in auditable decryption for bfv-based homomorphic encryption., bibinfonumpages129--139 pages.
    [20]
    Alberto Ibarrondo, Hervé Chabanne, and Melek Önen. 2022a. Funshade: Functional secret sharing for two-party secure thresholded distance evaluation.
    [21]
    Anil K Jain, Patrick Flynn, and Arun A Ross. 2007. Handbook of biometrics. Springer Science & Business Media, USA.
    [22]
    Ze Liu, Yutong Lin, Yue Cao, Han Hu, Yixuan Wei, Zheng Zhang, Stephen Lin, and Baining Guo. 2021. Swin transformer: Hierarchical vision transformer using shifted windows., bibinfonumpages10012--10022 pages.
    [23]
    Ying Luo, S Cheung Sen-ching, and Shuiming Ye. 2009. Anonymous biometric access control based on homomorphic encryption., bibinfonumpages1046--1049 pages.
    [24]
    Vadim Lyubashevsky, Chris Peikert, and Oded Regev. 2010. On ideal lattices and learning with errors over rings., bibinfonumpages23 pages.
    [25]
    Payman Mohassel and Peter Rindal. 2018. ABY3: A mixed protocol framework for machine learning., bibinfonumpages35--52 pages.
    [26]
    Christian Mouchet, Juan Troncoso-Pastoriza, Jean-Philippe Bossuat, and Jean-Pierre Hubaux. 2021. Multiparty homomorphic encryption from ring-learning-with-errors., bibinfonumpages291--311 pages.
    [27]
    Christian Vincent Mouchet, Jean-Philippe Bossuat, Juan Ramón Troncoso-Pastoriza, and Jean-Pierre Hubaux. 2020. Lattigo: A multiparty homomorphic encryption library in go., bibinfonumpages64--70 pages.
    [28]
    Elena Pagnin, Christos Dimitrakakis, Aysajan Abidin, and Aikaterini Mitrokotsa. 2014. On the leakage of information in biometric authentication., bibinfonumpages265--280 pages.
    [29]
    Arpita Patra, Thomas Schneider, Ajith Suresh, and Hossein Yalame. 2021. $$ABY2. 0$$: Improved $$Mixed-Protocol$$ Secure $$Two-Party$$ Computation., bibinfonumpages2165--2182 pages.
    [30]
    Oded Regev. 2009. On lattices, learning with errors, random linear codes, and cryptography., bibinfonumpages40 pages.
    [31]
    Théo Ryffel, Pierre Tholoniat, David Pointcheval, and Francis Bach. 2020. Ariann: Low-interaction privacy-preserving deep learning via function secret sharing.
    [32]
    Christian Shahreza, Hatef Otroshiand Rathgeb, Dailé Osorio-Roig, Vedrana Krivokuca Hahn, Sébastien Marcel, and Christoph Busch. 2022. Hybrid Protection of Biometric Templates by Combining Homomorphic Encryption and Cancelable Biometrics.
    [33]
    Reza Shokri, Marco Stronati, Congzheng Song, and Vitaly Shmatikov. 2017. Membership inference attacks against machine learning models. In 2017 IEEE symposium on security and privacy (SP). IEEE, 3--18.
    [34]
    Florian Tramèr, Fan Zhang, Ari Juels, Michael K Reiter, and Thomas Ristenpart. 2016. Stealing machine learning models via prediction $$APIs$$. In 25th USENIX security symposium (USENIX Security 16). 601--618.
    [35]
    Juan Ramón Troncoso-Pastoriza, Alberto Pedrouzo-Ulloa, and Fernando Pérez-González. 2017. Secure genomic susceptibility testing based on lattice encryption. In 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2067--2071.
    [36]
    Yang, Wencheng and Wang, Song and Cui, Hui and Tang, Zhaohui and Li, Yan,. 2023. A review of homomorphic encryption for privacy-preserving biometrics. Issue Special Issue on Signal and Image Processing in Biometric Detection. io

    Index Terms

    1. Monchi: Multi-scheme Optimization For Collaborative Homomorphic Identification

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      IH&MMSec '24: Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security
      June 2024
      305 pages
      ISBN:9798400706370
      DOI:10.1145/3658664
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 24 June 2024

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. functional secret sharing
      2. masking
      3. multiparty homomorphic encryption
      4. privacy preserving technologies
      5. scalar product
      6. secure two party computation

      Qualifiers

      • Research-article

      Funding Sources

      • 3IA Côte dðAzur program

      Conference

      IH&MMSEC '24
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 128 of 318 submissions, 40%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 19
        Total Downloads
      • Downloads (Last 12 months)19
      • Downloads (Last 6 weeks)19

      Other Metrics

      Citations

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media