[go: up one dir, main page]

Luis, 2023 - Google Patents

Privacy-preserving biometric recognition systems with advanced cryptographic techniques

Luis, 2023

View PDF
Document ID
8135462184749559370
Author
Luis A
Publication year

External Links

Snippet

Dealing with highly sensitive data, identity management systems must provide adequate privacy protection as they leverage biometrics technology. Wielding Multi-Party Computation (MPC), Homomorphic Encryption (HE) and Functional Encryption (FE), this thesis tackles the …
Continue reading at theses.hal.science (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
Chou et al. Faster cryptonets: Leveraging sparsity for real-world encrypted inference
US20220092216A1 (en) Privacy-preserving machine learning in the three-server model
US11222138B2 (en) Privacy-preserving machine learning in the three-server model
US20190356666A1 (en) Generating Cryptographic Function Parameters From Compact Source Code
Nagaraju et al. Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway
US20240265114A1 (en) An apparatus and method for enhancing cybersecurity of an entity
US11316665B2 (en) Generating cryptographic function parameters based on an observed astronomical event
CN118520505B (en) Block chain generation-based artificial intelligent detection and evaluation method and system
Jovanovic et al. Private and reliable neural network inference
Ibarrondo et al. Banners: Binarized neural networks with replicated secret sharing
Gernot et al. Robust biometric scheme against replay attacks using one-time biometric templates
Prabhu et al. Privacy preserving steganography based biometric authentication system for cloud computing environment
Xing et al. Zero-Knowledge Proof-Based Verifiable Decentralized Machine Learning in Communication Network: A Comprehensive Survey
Singh et al. Leveraging generative adversarial networks for enhanced cryptographic key generation
Parihar et al. A framework for counting based secret sharing scheme for images
Luis Privacy-preserving biometric recognition systems with advanced cryptographic techniques
Adir et al. Homomorphic Encryption for Data Science (HE4DS)
Ibarrondo et al. Colmade: Collaborative masking in auditable decryption for bfv-based homomorphic encryption
Brännvall et al. Can the use of privacy enhancing technologies enable federated learning for health data applications in a Swedish regulatory context?
Failla Privacy-preserving processing of biometric templates by homomorphic encryption
Keerthana et al. Privacy preservation in federated learning
Upmanyu Efficient Privacy Preserving Protocols for Visual Computation
SUHASINI et al. FAORE PONY-INSPIRED CHAOTIC NEURAL ENCRYPTION FOR SECURE AND EFFICIENT MEDICAL IMAGE PROTECTION
Jahns et al. Privacy-Preserving Deep Learning: A Survey on Theoretical Foundations, Software Frameworks, and Hardware Accelerators
Nguyen Enhancing Privacy and Security in Cloud-Based Machine Learning