Secure Biometric Verification in the Presence of Malicious Adversaries

Kamela Al-Mannai*, Elmahdi Bentafat, Spiridon Bakiras, Jens Schneider

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

In a secure biometric verification system, users authenticate themselves by submitting their encrypted biometric data to the application server. Such systems must be able to defend against 1) malicious clients that try to gain unauthorized access to the system; and 2) malicious servers that aim to identify the users' plaintext biometric data. To this end, our work introduces an efficient biometric verification protocol that is provably secure against both a malicious client and a malicious server. We formally prove the security of our scheme in the random oracle model and also present results from a proof-of-concept implementation. Our results demonstrate that the protocol is very efficient, incurring just 880 ms of computational overhead and 99 KB of communication cost.
Original languageEnglish
Pages (from-to)5284-5295
Number of pages12
JournalIEEE Access
Volume13
DOIs
Publication statusPublished - 9 Jan 2025

Keywords

  • Authentication
  • Biometric data privacy
  • Biometric verification
  • Costs
  • Cryptography
  • Euclidean distance
  • Face recognition
  • Hands
  • Homomorphic encryption
  • Pairing-based cryptography
  • Protocols
  • Secure computations
  • Servers
  • Vectors

Fingerprint

Dive into the research topics of 'Secure Biometric Verification in the Presence of Malicious Adversaries'. Together they form a unique fingerprint.

Cite this