Luis, 2023 - Google Patents
Privacy-preserving biometric recognition systems with advanced cryptographic techniquesLuis, 2023
View PDF- Document ID
- 8135462184749559370
- Author
- Luis A
- Publication year
External Links
Snippet
Dealing with highly sensitive data, identity management systems must provide adequate privacy protection as they leverage biometrics technology. Wielding Multi-Party Computation (MPC), Homomorphic Encryption (HE) and Functional Encryption (FE), this thesis tackles the …
- 238000000034 method 0 title abstract 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Chou et al. | Faster cryptonets: Leveraging sparsity for real-world encrypted inference | |
| US20220092216A1 (en) | Privacy-preserving machine learning in the three-server model | |
| US11222138B2 (en) | Privacy-preserving machine learning in the three-server model | |
| US20190356666A1 (en) | Generating Cryptographic Function Parameters From Compact Source Code | |
| Nagaraju et al. | Trusted framework for online banking in public cloud using multi-factor authentication and privacy protection gateway | |
| US20240265114A1 (en) | An apparatus and method for enhancing cybersecurity of an entity | |
| US11316665B2 (en) | Generating cryptographic function parameters based on an observed astronomical event | |
| CN118520505B (en) | Block chain generation-based artificial intelligent detection and evaluation method and system | |
| Jovanovic et al. | Private and reliable neural network inference | |
| Ibarrondo et al. | Banners: Binarized neural networks with replicated secret sharing | |
| Gernot et al. | Robust biometric scheme against replay attacks using one-time biometric templates | |
| Prabhu et al. | Privacy preserving steganography based biometric authentication system for cloud computing environment | |
| Xing et al. | Zero-Knowledge Proof-Based Verifiable Decentralized Machine Learning in Communication Network: A Comprehensive Survey | |
| Singh et al. | Leveraging generative adversarial networks for enhanced cryptographic key generation | |
| Parihar et al. | A framework for counting based secret sharing scheme for images | |
| Luis | Privacy-preserving biometric recognition systems with advanced cryptographic techniques | |
| Adir et al. | Homomorphic Encryption for Data Science (HE4DS) | |
| Ibarrondo et al. | Colmade: Collaborative masking in auditable decryption for bfv-based homomorphic encryption | |
| Brännvall et al. | Can the use of privacy enhancing technologies enable federated learning for health data applications in a Swedish regulatory context? | |
| Failla | Privacy-preserving processing of biometric templates by homomorphic encryption | |
| Keerthana et al. | Privacy preservation in federated learning | |
| Upmanyu | Efficient Privacy Preserving Protocols for Visual Computation | |
| SUHASINI et al. | FAORE PONY-INSPIRED CHAOTIC NEURAL ENCRYPTION FOR SECURE AND EFFICIENT MEDICAL IMAGE PROTECTION | |
| Jahns et al. | Privacy-Preserving Deep Learning: A Survey on Theoretical Foundations, Software Frameworks, and Hardware Accelerators | |
| Nguyen | Enhancing Privacy and Security in Cloud-Based Machine Learning |