Abstract
Wang et al. recently proposed a privacy-preserving biometric identification scheme. However, the security assumption of the scheme does not capture practical aspects of real world attacks. In this paper, we consider a practical attack model which results in the leakage of biometric data in Wang et al.'s scheme. We first show the feasibility of our attack model and demonstrate how an attacker is able to recover the biometric data. Then, we propose a new biometric identification scheme that is secure against the attack model.
Original language | English |
---|---|
Title of host publication | CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security |
Publisher | Association for Computing Machinery |
Pages | 1826-1828 |
Number of pages | 3 |
ISBN (Electronic) | 9781450341394 |
DOIs | |
Publication status | Published - 2016 Oct 24 |
Event | 23rd ACM Conference on Computer and Communications Security, CCS 2016 - Vienna, Austria Duration: 2016 Oct 24 → 2016 Oct 28 |
Publication series
Name | Proceedings of the ACM Conference on Computer and Communications Security |
---|---|
Volume | 24-28-October-2016 |
ISSN (Print) | 1543-7221 |
Conference
Conference | 23rd ACM Conference on Computer and Communications Security, CCS 2016 |
---|---|
Country/Territory | Austria |
City | Vienna |
Period | 16/10/24 → 16/10/28 |
Bibliographical note
Funding Information:This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIP) (No. 2016R1A2A2A05005402).
Keywords
- Biometric identification
- Cloud
- Privacy
ASJC Scopus subject areas
- Software
- Computer Networks and Communications