A Review of Homomorphic Encryption for Privacy-Preserving Biometrics
Abstract
:1. Introduction
- Cancelable biometrics: For security reasons, cancelable biometric systems do not store the original biometric data as templates. Instead, raw biometric data are transformed by a non-invertible transformation function in the enrolment phase, and the transformed data are stored in the database. Such a transformation is intentional and reproducible [7]. An essential property of cancelable biometrics is irreversibility, meaning that it should be computationally infeasible to retrieve the original biometric data from the transformed template [8]. In the verification phase, the same transformation is applied to the query data. Matching is performed in the transformed domain so that no original biometric data are divulged. If the stored (transformed) template is compromised, a new version can be generated by altering the transformation parameters. Cancelable biometrics is considered relatively simple and easy to implement.
- Biometric cryptosystems: Bio-cryptosystems combine the benefits of biometrics and cryptography. In bio-cryptosystems, secret keys are either technically tied to or directly produced from biometric data. The original biometric data are encrypted by a secure sketch (e.g., Fuzzy Commitment [9], Fuzzy Vault [10] and PinSketch [11]) with helper data as the output. The helper data are generated by an irreversible cryptographic process so that it is difficult for adversaries to acquire the original biometric features from the helper data [12].
- Homomorphic encryption (HE): HE tackles the data privacy issues by performing multiple operations on the encrypted data without any decryption [13]. Because the result of the HE computation remains encrypted and can only be decrypted by the data owners, confidentiality is kept and any third party can operate over the ciphertext without accessing the original plaintext [14].
Organisation of This Work
2. Motivation and Contributions
2.1. Motivation
2.2. Contributions
- To the best of our knowledge, this work is the first comprehensive review of HE for privacy-preserving biometrics. In this survey, state-of-the-art HE-based approaches to biometric security are discussed and analysed.
- Various biometric-related HE methods were compared in terms of computational efficiency to provide readers a clear understanding of each method’s computing capacity.
- Challenges and future research directions were set out to show potential pathways in the study of HE.
- This review paper is a helpful reference for researchers working on privacy-preserving techniques in the area of biometric security (also known as biometric template protection). A taxonomy of the main points of knowledge in this review is given in Figure 2.
3. Homomorphic Encryption
3.1. The Basics of HE
- Homomorphic addition:
- Homomorphic multiplication:
- Key generation:
- Encryption:
- Decryption:
- Homomorphic multiplication:
3.2. Partially Homomorphic Encryption
- GM [30]: GM is the first probabilistic public key encryption scheme proposed by Goldwasser and Micali. The GM cryptosystem is based on the hardness of the quadratic residuosity problem.
3.3. Somewhat Homomorphic Encryption
- BGN [31]: Developed by Dan Boneh, Eu-Jin Goh and Kobbi Nissim, the BGN scheme was the first to support the addition and multiplication of ciphertexts with a constant size. It allows for any number of additions and a single multiplication operation on a ciphertext of a specified length. The homomorphic property of BGN allows users to evaluate multi-variate polynomials of a total degree of two given the encrypted inputs. The security of BGN is achieved under the assumption of the subgroup decision problem [17].
- CKKS [27]: Proposed by Jung Cheon, Andrey Kim, Miran Kim and Yongsoo Song, the CKKS scheme permits approximate addition and multiplication over ciphertexts whose plaintexts can be vectors of real or complex values. Since many HE schemes only work on binary or integer values, this feature of CKKS has attracted many researchers’ attention [14].
3.4. Fully Homomorphic Encryption
- BGV [33]: This scheme was a credit to Zvika Brakerski, Craig Gentry and Vinod Vaikuntanathan based on learning with error (LWE) or ring-LWE (RLWE) [33], without Gentry’s bootstrapping procedure [24]. Considered one of the hardest problems, which can be addressed in polynomial time, LWE has been intensively studied to build postquantum cryptographic solutions. As an algebraic variant of LWE, RLWE was put forth to have more efficient real-world applications with stronger security.
- BFV [34]: Considering the complexity and efficiency issues of FHE, Brakerski proposed several LWE-based FHE schemes, including Brakerski’s scale-invariant scheme [35]. BFV is the Fan–Vercauteren variant of Brakerski’s scale-invariant scheme [35]. It modifies the LWE setting in [35] to be RLWE. Using a simple modulus switching trick, BFV is more efficient than Brakerski’s scale-invariant scheme [35] according to [14]. The security of BFV-type cryptosystems is based on the RLWE problem.
3.5. Possible Attacks on HE Systems
- Side-channel attacks [36]: Side-channel attacks assume that an adversary has access to some information about the secret key of the encryption algorithm. For example, the adversary launches timing attacks [37] that take advantage of the time a system spends on calculations while the encryption/decryption algorithm is being executed. Side-channel attacks are especially troublesome for HE as the encryption/decryption process involves a complex computation, which may leave a trace of information that can be exploited. A desirable security requirement for HE schemes is to have resistance to such attacks, often called leakage resilience, meaning that semantic security should not be breached, even in the case of side-channel attacks.
- Black box attacks [38]: A black box attack on HE takes place when an adversary gains access to the encrypted data and manipulates them, but the adversary has no access to the secret key. The adversary’s objective is to obtain information about the plaintext data by examining the output of the homomorphic operation. Through randomised encoding, such as adding a random value to the plaintext before encryption, black box attacks can be tackled.
- Lattice attacks [39]: A lattice attack is a form of attack exploiting the vulnerabilities in lattice structures to restore the secret key in a lattice-based cryptosystem. This type of attack can be used to target some lattice-based HE schemes. For example, it was shown in [39] that, under certain parameter settings, an attacker could directly derive the plaintext from the ciphertext and public key even without using the secret key of the lattice-based FHE.
4. Potential HE Libraries for Biometric Security
- SEAL [42]: SEAL stands for Simple Encrypted Arithmetic Library. Developed by Microsoft’s Cryptography and Privacy Research Group, SEAL was first released in 2015 for the specific purpose of making available a well-designed and recorded HE library. SEAL suits both experts and non-experts having little or no background in cryptography. Recent releases of Microsoft SEAL have incorporated a diverse range of HE schemes, such as BGV, BFV and CKKS. SEAL is implemented in C++ and going through active development in other languages (e.g., C#, Python and JavaScript). For example, a Python version of SEAL is available, called PySEAL [43].
- HElib [44]: HElib stands for Homomorphic-Encryption Library. Released in 2013, HElib is the first open-source library that implements HE. Developed in C++, HElib specialises in the efficient use of BGV, CKKS and ciphertext packing schemes, as well as Gentry–Halevi–Smart optimisations. After releasing the first build of HElib, the authors made algorithmic improvements, such as high-speed homomorphic linear transformations, enabling HElib to be much faster than the previous builds.
- TFHE [45]: TFHE refers to Faster Fully Homomorphic Encryption. Released in about 2016, TFHE is an open-source library that persists in the ring variant of the Gentry–Sahai–Waters (GSW) scheme [46].Developed in C/C++, TFHE is a very fast door-by-door bootstrap program with no restrictions on the number of gates or their composition.
- FHEW [47]: FHEW is the acronym for Fastest Homomorphic Encryption. Built on a fully homomorphic encryption scheme [48], the first version of FHEW was released in about 2015. Written in C, this library offers symmetric encryption to encrypt/decrypt single-bit messages and supports homomorphic assessment of encrypted data using a public key for arbitrary Boolean circuits.
- HEANN [27]: HEAAN stands for Homomorphic Encryption for Arithmetic of Approximate Numbers. Developed in C++ and first released in 2016, HEAAN is a library that supports fixed-point arithmetic and CKKS.
- PALISADE [49]: Developed in an open-source C++ project, PALISADE was first released in 2019. An effective realisation of the lattice cryptography build block, PALISADE supports a number of HE schemes (e.g., BGV, BFV and CKKS). It also allows multiparty extensions of selected HE schemes and relevant primitives of cryptography, such as digital signature techniques, proxy re-encryption and program obfuscation.
- Lattigo [50]: Implemented in Go [51] and released in 2019, Lattigo is a lattice-based encryption library designed to support HE schemes (e.g., BFV, BGV and CKKS) in distributed systems and microservice architectures. It implements RLWE-based HE primitives and multiparty-homomorphic-encryption-based security algorithms.
- Pyfhel [52]: Pyfhel stands for Python For Homomorphic Encryption Library. First released in 2018, Pyfhel enables some HE operations in Python, such as addition, multiplication, exponentiation or scalar products. This library is suitable for both simple HE demonstrations and complicated problems such as machine learning algorithms. Pyfhel was built using Python and Cython on top of Abstraction Homomorphic Encryption Library (Afhel) in C++.
- Python-Paillier [55]: Written in Python, Python-Paillier was designed, built and supported by CSIRO’s Data61. This library makes it possible for encrypted numbers to be added together, multiplied by a non-encrypted scalar or added to a non-encrypted scalar.
- Java-Paillier [56]: Java-Paillier is a Java implementation of Paillier PHE.
- TenSEAL [57]: TenSEAL is a library for cryptographic tensor computation using HE. It allows tensors to be converted directly from popular machine learning frameworks (e.g., PyTorch and Tensorflow) into encrypted versions. As such, it equips classical machine learning frameworks with HE capabilities. TenSEAL is the implementation of the CKKS program in Microsoft SEAL. It supports both C++ and Python.
HE Library | Year Released | HE Schemes Supported | Development Language |
---|---|---|---|
HElib [44] | 2013 | BGV and CKKS | C++ |
Python-Paillier [55] | 2013 | Paillier | Python |
Java-Paillier [56] | - | Paillier | Java |
SEAL [44] | 2015 | BGV, BFV and CKKS | C++ |
FHEW [47] | 2015 | - | C |
TFHE [45] | 2016 | Ring variant of GSW | C/C++ |
HEANN [27] | 2016 | CKKS | C++ |
Pyfhel [52] | 2018 | BGV, BFV and CKKS | Python and Cython |
PALISADE [49] | 2019 | BGV, BFV and CKKS | C++ |
Lattigo [50] | 2019 | BGV, BFV and CKKS | Go |
TenSEAL [57] | 2021 | CKKS | C++ or Python |
OpenFHE [53] | 2022 | BGV, BFV and CKKS | C++ |
5. HE-Based Approaches to Biometric Security
5.1. HE-Based Approaches to Face Security
5.2. HE-Based Approaches to Iris Security
5.3. HE-Based Approaches to Fingerprint Security
5.4. HE-Based Approaches to Gait Security
5.5. HE-Based Approaches to Voice Security
5.6. HE-Based Approaches to Signature Security
5.7. HE-Based Approaches to Multimodal Biometric Security
5.7.1. Iris and Fingerprint
5.7.2. Signature and Fingerprint
5.7.3. Face and Voice
5.8. HE-Based Approaches to the Security of Non-Specific Biometric Modalities
6. Integrating HE with Other Technologies for Biometric Security
6.1. HE with Blockchain
6.2. HE with Machine/Deep Learning
6.3. HE with Differential Privacy
7. Challenges and Future Research Directions
7.1. Challenges
- Limited operations/functionalities: Many HE schemes can only carry out specific calculations, such as addition and multiplication. However, biometric systems (e.g., face recognition and fingerprint authentication) may need HE schemes to be able to handle more advanced mathematical operations, such as convolutions, Fourier transforms and exponential and logarithmic operations on encrypted data. Although some computations (e.g., loss function calculation in the encrypted domain with privacy-preserving DL [100]) are adaptable to basic operations such as addition and multiplication, efficiency and accuracy may be compromised.
- Potential vulnerabilities: The implementation of HE in biometrics provides additional privacy protection for the storage and comparison of biometric data, but HE schemes are relatively new and have not been extensively studied for their counter-attack ability. When implemented in biometric systems in practice, HE schemes may suffer from potential attacks and show vulnerabilities. For example, research reveals that HE schemes can be exposed to attacks such as decoding attacks, dual attacks, side-channel attacks [36], key-recovery attack [101] and reaction attacks [41]. Privacy issues also arise during data manipulation in HE-based systems. As noted in [102], the convenience of direct manipulation on encrypted data makes it hard for HE-based systems to track intermediate computations. This increases the possibility of a malicious attack where sensitive biometric data may be leaked from a client or server compromised by an adversary.
- Technical complexity: Implementing HE schemes in biometrics can be technically complex and demands a sound understanding of the underlying mathematics and even encryption itself [24]. Since many industry professionals, especially novices, do not have the required level of relevant mathematical knowledge about HE, it would be challenging for them to implement HE schemes in biometric systems. For this reason, academics and researchers should develop easy-to-use HE schemes and libraries to facilitate the implementation of HE in biometric applications.
- Computational complexity: HE schemes are computationally intensive and can be resource-intensive as well, making real-time HE applications in biometrics a challenge. For example, as shown in Section 5, the computing time (e.g.,transactions) of some HE-based biometric systems could take more than 10 s (see, e.g., Pradel et al. [62], Torres et al. [72], Luo et al. [74] and Barni et al. [80]). Since practical biometric applications (e.g., access control) may require timely responses, the computationally intensive nature of HE schemes is likely to cause too much delay or latency, thus making it challenging to use HE in large-scale or time-pressing biometric systems where low latency is required.
- Performance trade-off: Allowing computations to be conducted on encrypted data without decrypting them makes HE a powerful tool, but there are substantial overheads associated with HE applications in biometrics. For example, the ciphertext size is typically larger than the plaintext size, so encrypted biometric data require more computational resources and storage space [79]. Furthermore, operations on encrypted data can be time-consuming. In order to speed up the encryption and decryption operations, advanced and specialised hardware platforms have to be chosen for HE schemes applied to biometric security. Although it is appealing for HE-based privacy-preserving biometric systems to have good recognition performance, high efficiency and strong security, they are likely competing criteria, which may entail a performance trade-off.
- Key management: The security of HE-based biometric systems heavily relies on the management of cryptographic keys. Usually, the public key is for encryption purposes, whereas the private key is for decryption purposes. The management of the private key is critical for securing the confidentiality of encrypted biometric data. Lee et al. [103] introduced the concept of hierarchical Galois key generation for HE to relieve the burden of clients and the server running BFV and CKKS schemes. Unfortunately, most of the existing key management methods are developed for general HE applications rather than HE-based biometrics. Therefore, it is imperative to specifically design key management methods suitable for HE-based biometric systems.
7.2. Future Research Directions
- Development of efficient HE schemes: There is a demand to devise new HE solutions that are faster and require fewer resources or to develop ways of optimising existing HE schemes for biometric applications.
- Combination of HE with other techniques: In order to strengthen security, it is worth investigating the combination of HE with other privacy-enhancing techniques, such as blockchain and DP. Furthermore, finding stable and high-quality feature-learning approaches will improve the recognition accuracy of HE-based biometric systems.
- Development of HE solutions that can handle sophisticated operations: This involves developing HE schemes capable of more advanced mathematical operations (e.g., convolution and Fourier transforms), as they may be required by the training, feature transformation and matching procedures of biometric systems.
- Counter-attack research: With an increasing risk of attacks on HE-based biometric authentication systems, it is of necessity to study how to defend various attacks and make HE schemes more robust.
- Practical implementation of HE schemes: Although the practicability of HE in real-world biometric applications is constrained by factors such as technical complexity and hefty computation, HE is a promising technique from the security point of view. When implementations are optimised and streamlined, HE solutions will be more effective and practical.
8. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Yang, W.; Wang, S.; Hu, J.; Zheng, G.; Valli, C. Security and Accuracy of Fingerprint-based Biometrics: A Review. Symmetry 2019, 11, 141. [Google Scholar] [CrossRef] [Green Version]
- Yang, W.; Wang, S.; Sahri, N.M.; Karie, N.M.; Ahmed, M.; Valli, C. Biometrics for Internet-of-Things Security: A Review. Sensors 2021, 21, 6163. [Google Scholar] [CrossRef] [PubMed]
- Yang, W.; Wang, S.; Shahzad, M.; Zhou, W. A cancelable biometric authentication system based on feature-adaptive random projection. J. Inf. Secur. Appl. 2021, 58, 102704. [Google Scholar] [CrossRef]
- Saraswathi, M.; Sivakumari, D.S. Evaluation of PCA and LDA techniques for Face recognition using ORL face database. Int. J. Comput. Sci. Inf. Technol. 2015, 6, 810–813. [Google Scholar]
- Maio, D.; Maltoni, D.; Cappelli, R.; Wayman, J.L.; Jain, A.K. FVC2002: Second fingerprint verification competition. In Proceedings of the 2002 International Conference on Pattern Recognition, Quebec City, QC, Canada, 11–15 August 2002; IEEE: New York, NY, USA, 2002; Volume 3, pp. 811–814. [Google Scholar]
- Iezzi, M. Practical privacy-preserving data science with homomorphic encryption: An overview. In Proceedings of the 2020 IEEE International Conference on Big Data (Big Data), Atlanta, GA, USA, 10–13 December 2020; IEEE: New York, NY, USA, 2020; pp. 3979–3988. [Google Scholar]
- Yang, W.; Hu, J.; Wang, S.; Wu, Q. Biometrics based Privacy-Preserving Authentication and Mobile Template Protection. Wirel. Commun. Mob. Comput. 2018, 2018, 7107295. [Google Scholar] [CrossRef]
- Yang, W.; Wang, S.; Kang, J.J.; Johnstone, M.N.; Bedari, A. A linear convolution-based cancelable fingerprint biometric authentication system. Comput. Secur. 2022, 114, 102583. [Google Scholar] [CrossRef]
- Juels, A.; Wattenberg, M. A fuzzy commitment scheme. In Proceedings of the 6th ACM Conference on Computer and Communications Security, Singapore, 1–4 November 1999; ACM: New York, NY, USA, 1999; pp. 28–36. [Google Scholar]
- Juels, A.; Sudan, M. A fuzzy vault scheme. Des. Codes Cryptogr. 2006, 38, 237–257. [Google Scholar] [CrossRef]
- Dodis, Y.; Reyzin, L.; Smith, A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Proceedings of the Advances in cryptology-Eurocrypt 2004, Interlaken, Switzerland, 2–6 May 2004; Springer: Berlin/Heidelberg, Germany, 2004; pp. 523–540. [Google Scholar]
- Yang, W.; Hu, J.; Wang, S. A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security Enhancement. IEEE Trans. Inf. Forensics Secur. 2014, 9, 1179–1192. [Google Scholar] [CrossRef]
- Marcolla, C.; Sucasas, V.; Manzano, M.; Bassoli, R.; Fitzek, F.H.; Aaraj, N. Survey on Fully Homomorphic Encryption, Theory, and Applications. Proc. IEEE 2022, 110, 1572–1609. [Google Scholar] [CrossRef]
- Doan, T.V.T.; Messai, M.L.; Gavin, G.; Darmon, J. A Survey on Implementations of Homomorphic Encryption Schemes. Res. Sq. 2022, 37. [Google Scholar] [CrossRef]
- Munjal, K.; Bhatia, R. A systematic review of homomorphic encryption and its contributions in healthcare industry. Complex Intell. Syst. 2022, 1–28. [Google Scholar] [CrossRef] [PubMed]
- Abreu, Z.; Pereira, L. Privacy protection in smart meters using homomorphic encryption: An overview. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 2022, 12, e1469. [Google Scholar] [CrossRef]
- Pulido-Gaytan, B.; Tchernykh, A.; Cortés-Mendoza, J.M.; Babenko, M.; Radchenko, G.; Avetisyan, A.; Drozdov, A.Y. Privacy-preserving neural networks with Homomorphic encryption: Challenges and opportunities. Peer-Peer Netw. Appl. 2021, 14, 1666–1691. [Google Scholar] [CrossRef]
- Chen, Z.; Hu, G.; Zheng, M.; Song, X.; Chen, L. Bibliometrics of machine learning research using homomorphic encryption. Mathematics 2021, 9, 2792. [Google Scholar] [CrossRef]
- Bansal, V. Survey on Homomorphic Encryption. In Proceedings of the 2021 5th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 22–23 October 2021; IEEE: New York, NY, USA, 2021; pp. 1–4. [Google Scholar]
- Wood, A.; Najarian, K.; Kahrobaei, D. Homomorphic encryption for machine learning in medicine and bioinformatics. ACM Comput. Surv. (CSUR) 2020, 53, 1–35. [Google Scholar] [CrossRef]
- Rivest, R.L.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef] [Green Version]
- ElGamal, T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 1985, 31, 469–472. [Google Scholar] [CrossRef]
- Bringer, J.; Chabanne, H.; Patey, A. Privacy-preserving biometric identification using secure multiparty computation: An overview and recent trends. IEEE Signal Process. Mag. 2013, 30, 42–52. [Google Scholar] [CrossRef]
- Gentry, C. A Fully Homomorphic Encryption Scheme; Stanford University: Stanford, CA, USA, 2009. [Google Scholar]
- Sun, X.; Yu, F.R.; Zhang, P.; Xie, W.; Peng, X. A survey on secure computation based on homomorphic encryption in vehicular ad hoc networks. Sensors 2020, 20, 4253. [Google Scholar] [CrossRef]
- Paillier, P. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Prague, Czech Republic, 2–6 May 1999; Springer: Berlin/Heidelberg, Germany, 1999; pp. 223–238. [Google Scholar]
- Cheon, J.H.; Kim, A.; Kim, M.; Song, Y. Homomorphic encryption for arithmetic of approximate numbers. In Proceedings of the International conference on the theory and application of cryptology and information security, Hong Kong, China, 3–7 December 2017; Springer: Berlin/Heidelberg, Germany, 2017; pp. 409–437. [Google Scholar]
- Li, L. An electronic voting scheme based on ElGamal homomorphic encryption for privacy protection. In Proceedings of the Journal of Physics: Conference Series; IOP Publishing: Bristol, UK, 2020; Volume 1544, p. 012036. [Google Scholar]
- Diffie, W.; Hellman, M.E. New directions in cryptography. In Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman; Springer: Berlin/Heidelberg, Germany, 2022; pp. 365–390. [Google Scholar]
- Goldwasser, S.; Micali, S. Probabilistic encryption & how to play mental poker keeping secret all partial information. In Proceedings of the Fourteenth Annual ACM Symposium on Theory of Computing, San Francisco, CA, USA, 5–7 May 1982; pp. 365–377. [Google Scholar]
- Boneh, D.; Goh, E.J.; Nissim, K. Evaluating 2-DNF formulas on ciphertexts. In Proceedings of the Theory of Cryptography Conference, Cambridge, MA, USA, 10–12 February 2005; Springer: Berlin/Heidelberg, Germany, 2005; pp. 325–341. [Google Scholar]
- Zhigang, C.; Jian, W.; Liqun, C.; Xinxia, S. Review of how to construct a fully homomorphic encryption scheme. Int. J. Secur. Its Appl. 2014, 8, 221–230. [Google Scholar]
- Brakerski, Z.; Gentry, C.; Vaikuntanathan, V. (Leveled) fully homomorphic encryption without bootstrapping. ACM Trans. Comput. Theory (TOCT) 2014, 6, 1–36. [Google Scholar] [CrossRef] [Green Version]
- Fan, J.; Vercauteren, F. Somewhat practical fully homomorphic encryption. In Cryptology ePrint Archive; 2012; p. 19. Available online: https://eprint.iacr.org/2012/144 (accessed on 1 February 2023).
- Brakerski, Z. Fully homomorphic encryption without modulus switching from classical GapSVP. In Proceedings of the Annual Cryptology Conference, Barbara, CA, USA, 19–23 August 2012; Springer: Berlin/Heidelberg, Germany, 2012; pp. 868–886. [Google Scholar]
- Chase, M.; Chen, H.; Ding, J.; Goldwasser, S.; Gorbunov, S.; Hoffstein, J.; Lauter, K.; Lokam, S.; Moody, D.; Morrison, T. Security of homomorphic encryption. HomomorphicEncryption. org, Redmond WA, Tech. Rep. 2017. Available online: https://www.microsoft.com/en-us/research/wp-content/uploads/2018/01/security_homomorphic_encryption_white_paper.pdf (accessed on 1 February 2023).
- Cheng, W.; Danger, J.L.; Guilley, S.; Huang, F.; Korchi, A.B.; Rioul, O. Cache-Timing Attack on the SEAL Homomorphic Encryption Library. In Proceedings of the 11th International Workshop on Security Proofs for Embedded Systems (PROOFS 2022), Leuven, Belgium, 19 September 2022. [Google Scholar]
- Borovik, A.; Yalçınkaya, Ş. Homomorphic encryption and some black box attacks. In Proceedings of the Mathematical Software–ICMS 2020: 7th International Conference, Braunschweig, Germany, 13–16 July 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 115–124. [Google Scholar]
- Chunsheng, G. Attack on fully homomorphic encryption over the integers. arXiv 2012, arXiv:1202.3321. [Google Scholar] [CrossRef]
- Bogos, S.; Gaspoz, J.; Vaudenay, S. Cryptanalysis of a homomorphic encryption scheme. Cryptogr. Commun. 2018, 10, 27–39. [Google Scholar] [CrossRef] [Green Version]
- Zhang, Z.; Plantard, T.; Susilo, W. Reaction attack on outsourced computing with fully homomorphic encryption schemes. In Proceedings of the International Conference on Information Security and Cryptology, Seoul, Republic of Korea, 2–4 December 2020; Springer: Berlin/Heidelberg, Germany, 2012; pp. 419–436. [Google Scholar]
- Laine, K. Simple Encrypted Arithmetic Library 2.3.1. Microsoft Research. Available online: https://www.microsoft.com/en-us/research/uploads/prod/2017/11/sealmanual-2-3-1.pdf (accessed on 1 February 2023).
- Titus, A.J.; Kishore, S.; Stavish, T.; Rogers, S.M.; Ni, K. PySEAL: A Python wrapper implementation of the SEAL homomorphic encryption library. arXiv 2018, arXiv:1803.01891. [Google Scholar]
- Halevi, S.; Shoup, V. Algorithms in helib. In Proceedings of the Annual Cryptology Conference, Santa Barbara, CA, USA, 17–21 August 2014; Springer: Berlin/Heidelberg, Germany, 2014; pp. 554–571. [Google Scholar]
- Chillotti, I.; Gama, N.; Georgieva, M.; Izabachene, M. Faster fully homomorphic encryption: Bootstrapping in less than 0.1 seconds. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, 4–8 December 2016; Springer: Berlin/Heidelberg, Germany, 2016; pp. 3–33. [Google Scholar]
- Li, Z.; Galbraith, S.D.; Ma, C. Preventing adaptive key recovery attacks on the GSW levelled homomorphic encryption scheme. In Proceedings of the International Conference on Provable Security, Nanjing, China, 10–11 November 2016; Springer: Berlin/Heidelberg, Germany, 2016; pp. 373–383. [Google Scholar]
- FHEW Library. Available online: https://github.com/lducas/FHEW/ (accessed on 1 February 2023).
- Ducas, L.; Micciancio, D. FHEW: Bootstrapping homomorphic encryption in less than a second. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, 2630 April 2015; Springer: Berlin, Germany, 2015; pp. 617–640. [Google Scholar]
- Polyakov, Y.; Rohloff, K.; Ryan, G.W. Palisade Lattice Cryptography Library User Manual; Technical Report; Cybersecurity Research Center, New Jersey Institute of Technology (NJIT): Newark, NJ, USA, 2017; Volume 15. [Google Scholar]
- Mouchet, C.V.; Bossuat, J.P.; Troncoso-Pastoriza, J.R.; Hubaux, J.P. Lattigo: A multiparty homomorphic encryption library in go. In Proceedings of the 8th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, Virtual, 15 December 2020; pp. 64–70. [Google Scholar]
- Lattigo. Available online: https://github.com/tuneinsight/lattigo (accessed on 1 February 2023).
- Pyfhel Library. Available online: https://github.com/ibarrond/Pyfhel (accessed on 1 February 2023).
- OpenFHE Library. Available online: https://github.com/openfheorg/openfhe-development (accessed on 1 February 2023).
- Al Badawi, A.; Bates, J.; Bergamaschi, F.; Cousins, D.B.; Erabelli, S.; Genise, N.; Halevi, S.; Hunt, H.; Kim, A.; Lee, Y. OpenFHE: Open-source fully homomorphic encryption library. In Proceedings of the 10th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, Los Angeles, CA, USA, 7 November 2022; pp. 53–63. [Google Scholar]
- Data61, C. Python Paillier Library. 2013. Available online: https://github.com/data61/python-paillier (accessed on 1 February 2023).
- Java Paillier Library. Available online: http://www.csee.umbc.edu/~kunliu1/research/Paillier.html (accessed on 1 February 2023).
- Benaissa, A.; Retiat, B.; Cebere, B.; Belfedhal, A.E. TenSEAL: A library for encrypted tensor operations using homomorphic encryption. arXiv 2021, arXiv:2104.03152. [Google Scholar]
- Shahreza, H.O.; Rathgeb, C.; Osorio-Roig, D.; Hahn, V.K.; Marcel, S.; Busch, C. Hybrid Protection of Biometric Templates by Combining Homomorphic Encryption and Cancelable Biometrics. In Proceedings of the 2022 International Joint Conference on Biometrics (IJCB 2022), Abu Dhabi, United Arab Emirates, 10–13 October 2022; p. 10. [Google Scholar]
- Roberto Román, R.A. A Quantum-Resistant Face Template Protection Scheme using Kyber and Saber Public Key Encryption Algorithms. In Proceedings of the 2022 International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany, 14–16 September 2022. [Google Scholar]
- Bauspieß, P.; Olafsson, J.; Kolberg, J.; Drozdowski, P.; Rathgeb, C.; Busch, C. Improved homomorphically encrypted biometric identification using coefficient packing. In Proceedings of the 2022 International Workshop on Biometrics and Forensics (IWBF), Salzburg, Austria, 20–21 April 2022; IEEE: New York, NY, USA, 2022; pp. 1–6. [Google Scholar]
- Yang, X.; Zhu, H.; Wang, F.; Zhang, S.; Lu, R.; Li, H. MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud. Peer-Peer Netw. Appl. 2021, 14, 2171–2186. [Google Scholar] [CrossRef]
- Pradel, G.; Mitchell, C. Privacy-Preserving Biometric Matching Using Homomorphic Encryption. In Proceedings of the 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Shenyang, China, 20–22 October 2022; IEEE: New York, NY, USA, 2021; pp. 494–505. [Google Scholar]
- Drozdowski, P.; Stockhardt, F.; Rathgeb, C.; Osorio-Roig, D.; Busch, C. Feature fusion methods for indexing and retrieval of biometric data: Application to face recognition with privacy protection. IEEE Access 2021, 9, 139361–139378. [Google Scholar] [CrossRef]
- Jindal, A.K.; Shaik, I.; Vasudha, V.; Chalamala, S.R.; Rajan, M.; Lodha, S. Secure and privacy preserving method for biometric template protection using fully homomorphic encryption. In Proceedings of the 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China, 29 December 2020–1 January 2021; IEEE: New York, NY, USA, 2020; pp. 1127–1134. [Google Scholar]
- Drozdowski, P.; Buchmann, N.; Rathgeb, C.; Margraf, M.; Busch, C. On the Application of Homomorphic Encryption to Face Identification. In Proceedings of the 2019 International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany, 18–20 September 2019; IEEE: New York, NY, USA, 2019; pp. 1–5. [Google Scholar]
- Wingarz, T.; Gomez-Barrero, M.; Busch, C.; Fischer, M. Privacy-Preserving Convolutional Neural Networks Using Homomorphic Encryption. In Proceedings of the 2022 International Workshop on Biometrics and Forensics (IWBF), Rome, Italy, 6–7 May 2021; IEEE: New York, NY, USA, 2021; pp. 1–6. [Google Scholar]
- Sun, D.; Huang, H.; Zheng, D.; Hu, H.; Bi, C.; Wang, R. Face Security Authentication System Based on Deep Learning and Homomorphic Encryption. Secur. Commun. Netw. 2022, 2022, 7752292. [Google Scholar] [CrossRef]
- Tamiya, H.; Isshiki, T.; Mori, K.; Obana, S.; Ohki, T. Improved Post-quantum-secure Face Template Protection System Based on Packed Homomorphic Encryption. In Proceedings of the 2021 International Conference of the Biometrics Special Interest Group (BIOSIG), Digital Conference, Darmstadt, Germany, 15–17 September 2021; IEEE: New York, NY, USA, 2021; pp. 1–5. [Google Scholar]
- Yang, W.; Wang, S.; Hu, J.; Ibrahim, A.; Zheng, G.; Macedo, M.; Johnstone, M.; Valli, C. A Cancelable Iris- and Steganography-based User Authentication System for the Internet of Things. Sensors 2019, 19, 2985. [Google Scholar] [CrossRef] [Green Version]
- Morampudi, M.K.; Prasad, M.V.; Verma, M.; Raju, U. Secure and verifiable iris authentication system using fully homomorphic encryption. Comput. Electr. Eng. 2021, 89, 106924. [Google Scholar] [CrossRef]
- Song, X.; Chen, Z.; Sun, D. Iris ciphertext authentication system based on fully homomorphic encryption. J. Inf. Process. Syst. 2020, 16, 599–611. [Google Scholar]
- Alberto Torres, W.A.; Bhattacharjee, N.; Srinivasan, B. Privacy-preserving biometrics authentication systems using fully homomorphic encryption. Int. J. Pervasive Comput. Commun. 2015, 11, 151–168. [Google Scholar] [CrossRef]
- Java Lattice Based Cryptography Library. Available online: http://gas.dia.unisa.it/projects/jlbc/ (accessed on 1 February 2023).
- Luo, Y.; Sen-ching, S.C.; Ye, S. Anonymous biometric access control based on homomorphic encryption. In Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, New York, NY, USA, 28 June–3 July 2009; IEEE: New York, NY, USA, 2009; pp. 1046–1049. [Google Scholar]
- Mahesh Kumar, M.; Prasad, M.V.; Raju, U. BMIAE: Blockchain-based multi-instance iris authentication using additive ElGamal homomorphic encryption. IET Biom. 2020, 9, 165–177. [Google Scholar] [CrossRef]
- Morampudi, M.K.; Prasad, M.V.; Raju, U. Privacy-preserving iris authentication using fully homomorphic encryption. Multimed. Tools Appl. 2020, 79, 19215–19237. [Google Scholar] [CrossRef]
- Torres, W.A.A.; Bhattacharjee, N.; Srinivasan, B. Effectiveness of fully homomorphic encryption to preserve the privacy of biometric data. In Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, Hanoi, Vietnam, 4–6 December 2014; ACM: New York, NY, USA, 2014; pp. 152–158. [Google Scholar]
- Shahzad, M.; Wang, S.; Deng, G.; Yang, W. Alignment-free Cancelable Fingerprint Templates with Dual Protection. Pattern Recognit. 2020, 111, 107735. [Google Scholar] [CrossRef]
- Yang, W.; Wang, S.; Yu, K.; Kang, J.J.; Johnstone, M.N. Secure Fingerprint Authentication with Homomorphic Encryption. In Proceedings of the 2020 Digital Image Computing: Techniques and Applications, Melbourne, Australia, 29 November–2 December 2020; IEEE: New York, NY, USA, 2020; pp. 1–6. [Google Scholar]
- Barni, M.; Bianchi, T.; Catalano, D.; Di Raimondo, M.; Labati, R.D.; Failla, P.; Fiore, D.; Lazzeretti, R.; Piuri, V.; Piva, A. A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates. In Proceedings of the 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), Washington, DC, USA, 27–29 September 2010; IEEE: New York, NY, USA, 2010; pp. 1–7. [Google Scholar]
- Lin, L.; Tian, B.; Zhao, Y.; Niu, Y. A Privacy-Preserving Gait Recognition Scheme Under Homomorphic Encryption. In Proceedings of the 2022 International Conference on Networking and Network Applications (NaNA), Urumqi, China, 3–5 December 2022; IEEE: New York, NY, USA, 2022; pp. 406–410. [Google Scholar]
- Ahmed, S.; Chowdhury, A.R.; Fawaz, K.; Ramanathan, P. Spreech: A System for Privacy-Preserving Speech Transcription. arXiv 2019, arXiv:1909.04198. [Google Scholar]
- Rahulamathavan, Y. Privacy-preserving Similarity Calculation of Speaker Features Using Fully Homomorphic Encryption. arXiv 2022, arXiv:2202.07994. [Google Scholar]
- Nautsch, A.; Isadskiy, S.; Kolberg, J.; Gomez-Barrero, M.; Busch, C. Homomorphic encryption for speaker recognition: Protection of biometric templates and vendor model parameters. arXiv 2018, arXiv:1803.03559. [Google Scholar]
- Lotfy, Y.A.; Darwish, S.M. A Secure Signature Scheme for IoT Blockchain Framework Based on Multimodal Biometrics. In Proceedings of the International Conference on Advanced Intelligent Systems and Informatics, Cairo, Egypt, 19–21 October 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 261–270. [Google Scholar]
- Gomez-Barrero, M.; Fierrez, J.; Galbally, J.; Maiorana, E.; Campisi, P. Implementation of fixed-length template protection based on homomorphic encryption with application to signature biometrics. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, Las Vegas, NV, USA, 26 June–1 July 2016; pp. 191–198. [Google Scholar]
- Yang, W.; Hu, J.; Wang, S.; Chen, C. Mutual dependency of features in multimodal biometric systems. Electron. Lett. 2015, 51, 234–235. [Google Scholar] [CrossRef]
- Vallabhadas, D.K.; Sandhya, M. Securing multimodal biometric template using local random projection and homomorphic encryption. J. Inf. Secur. Appl. 2022, 70, 103339. [Google Scholar] [CrossRef]
- Salem, M.; Taheri, S.; Yuan, J.S. Utilizing transfer learning and homomorphic encryption in a privacy preserving and secure biometric recognition system. Computers 2019, 8, 3. [Google Scholar] [CrossRef] [Green Version]
- Gomez-Barrero, M.; Maiorana, E.; Galbally, J.; Campisi, P.; Fierrez, J. Multi-biometric template protection based on Homomorphic Encryption. Pattern Recognit. 2017, 67, 149–163. [Google Scholar] [CrossRef]
- Sperling, L.; Ratha, N.; Ross, A.; Boddeti, V.N. HEFT: Homomorphically Encrypted Fusion of Biometric Templates. arXiv 2022, arXiv:2208.07241. [Google Scholar]
- Karabat, C.; Kiraz, M.S.; Erdogan, H.; Savas, E. THRIVE: Threshold homomorphic encryption based secure and privacy preserving biometric verification system. EURASIP J. Adv. Signal Process. 2015, 2015, 71. [Google Scholar] [CrossRef] [Green Version]
- Mandal, A.; Roy, A.; Yasuda, M. Comprehensive and improved secure biometric system using homomorphic encryption. In Data Privacy Management, and Security Assurance; Springer: Berlin/Heidelberg, Germany, 2015; pp. 183–198. [Google Scholar]
- Brakerski, Z.; Vaikuntanathan, V. Fully homomorphic encryption from ring-LWE and security for key dependent messages. In Proceedings of the Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa Barbara, CA, USA, 14–18 August 2011; Springer: Berlin/Heidelberg, Germany, 2011; pp. 505–524. [Google Scholar]
- Yasuda, M.; Shimoyama, T.; Kogure, J.; Yokoyama, K.; Koshiba, T. Packed homomorphic encryption based on ideal lattices and its application to biometrics. In Proceedings of the International Conference on Availability, Reliability, and Security, Regensburg, Germany, 2–6 September 2013; Springer: Berlin/Heidelberg, Germany, 2013; pp. 55–74. [Google Scholar]
- Yang, W.; Wang, S.; Yin, X.; Wang, X.; Hu, J. A Review on Security Issues and Solutions of the Internet of Drones. IEEE Open J. Comput. Soc. 2022, 3, 96–110. [Google Scholar] [CrossRef]
- Wang, X.; Zha, X.; Ni, W.; Liu, R.P.; Guo, Y.J.; Niu, X.; Zheng, K. Survey on blockchain for Internet of Things. Comput. Commun. 2019, 136, 10–29. [Google Scholar] [CrossRef]
- Wood, A.; Altman, M.; Bembenek, A.; Bun, M.; Gaboardi, M.; Honaker, J.; Nissim, K.; O’Brien, D.R.; Steinke, T.; Vadhan, S. Differential privacy: A primer for a non-technical audience. Vanderbilt J. Entertain. Technol. Law 2018, 21, 209. [Google Scholar] [CrossRef] [Green Version]
- Raisaro, J.L.; Choi, G.; Pradervand, S.; Colsenet, R.; Jacquemont, N.; Rosat, N.; Mooser, V.; Hubaux, J.P. Protecting privacy and security of genomic data in i2b2 with homomorphic encryption and differential privacy. IEEE/ACM Trans. Comput. Biol. Bioinform. 2018, 15, 1413–1426. [Google Scholar] [CrossRef]
- Hardy, S.; Henecka, W.; Ivey-Law, H.; Nock, R.; Patrini, G.; Smith, G.; Thorne, B. Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. arXiv 2017, arXiv:1711.10677. [Google Scholar]
- Chenal, M.; Tang, Q. On key recovery attacks against existing somewhat homomorphic encryption schemes. In Proceedings of the International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, 23–26 August 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 239–258. [Google Scholar]
- Bassit, A.; Hahn, F.; Peeters, J.; Kevenaar, T.; Veldhuis, R.N.; Peter, A. Biometric Verification Secure Against Malicious Adversaries. arXiv 2021, arXiv:2101.10631. [Google Scholar]
- Lee, J.W.; Lee, E.; Kim, Y.S.; No, J.S. Hierarchical Galois Key Management Systems for Privacy Preserving AIaaS with Homomorphic Encryption. 2022. Available online: https://eprint.iacr.org/2022/532 (accessed on 1 February 2023).
Scheme (Year) | HE Library | Trait (Database) | System/Hardware Specifications | Comparison on Data Type or Format, Data Size and Optimal Computing Time |
---|---|---|---|---|
Shahreza et al. [58] (2022) | SEAL | Face (ArcFace, ElasticFace and FaceNet) | Intel(R) Core(TM) i7-7700K CPU @ 4.20 GHz. | Data: binary-valued, 32 to 512 bits. Time: Encoding—1.19 ms. Comparison—23.14 ms. Decoding—0.38 ms. |
Román et al. [59] (2022) | - | Face (FERET and LFW) | Intel Core i7-1165G7 laptop @ 2.80 GHz. | Data: binary-valued, 1.44 KB. Time: Key generation—1.27 ms. Encryption—3.04 ms. Comparison—0.88 ms. |
Bauspieß et al. [60] (2022) | PALISADE | Face (VGGFace2) | Single core Intel i7-10750H processor of 2.60 GHz. | Data: binary-valued, 64 to 512 bits. Time: Single identification transaction—0.82 ms. |
Yang et al. [61] (2021) | - | Face (dataset of University of Essex) | Intel Core i7-8750H CPU @ 2.1 GHz and 16 GB RAM. | Data: no information. Time: no information. |
Pradel et al. [62] (2021) | TFHE | Face (-) | Ubuntu 20.04.1 LTS 64-bit machine with 8GB RAM and a quad-core Intel(R) Core(TM) i3-6100 CPU @ 3.70 GHz. | Data: binary-valued, 128 bits. Time: addition, subtraction and multiplication of two 128-bit feature vectors take 9 s, 30 s and 206 s, respectively. |
Drozdowski et al. [63] (2021) | SEAL | Face (MORPH) | Linux Debian 10 and a commodity notebook of an Intel Core i7 2.7 GHz CPU with 16GB DDR4 RAM. | Data: no information. Time: Key generation—362 ms. Encryption/decryption—27 ms. Comparison—23 ms. |
Jindal et al. [64] (2020) | - | Face (LFW, FEI and Georgia Tech) | Server with Intel Xeon Gold CPU clocked @ 2.4 Ghz with 64 GB RAM and 32 cores. | Data: real-valued, 128 dimensions. Time: Matching two encrypted face templates—2.83 ms. |
Drozdowski et al. [65] (2019) | SEAL | Face (FERET) | Virtualised Linux environment and one 2.5 GHz CPU with 8 GB RAM. | Data: floating-point, 512 dimensions. Time: Encryption/decryption—2.5 ms. Computing the distance between two encrypted feature vectors—850 ms |
Wingarz et al. [66] (2022) | SEAL | Face (Yale Face Database B) | Intel(R) Xeon(R) Gold 6130 CPU @ 2.10 GHz server with 256 GB RAM. | Data: no information. Time: Single image execution—0.2549 s. |
Sun et al. [67] (2022) | SEAL | Face (LFW, IJB and CASIA) | Intel Core i7-6700HQ processor. | Data: binary-valued, 64 to 128 bits. Time: no information. |
Tamiya et al. [68] (2021) | - | Face (FERET) | Ubuntu 18.04 machine with Intel Core i7-8700 3.2 GHz CPU and 16 GB DDR RAM. | Data: binary-valued, 128 to 2048 bits. Time: Total transaction—49.5 ms. |
Scheme (Year) | HE Library | Trait (Database) | System/Hardware Specification | Comparison on Data Type or Format, Data Size and Optimal Computing Time |
---|---|---|---|---|
Morampudi et al. [70] (2021) | - | Iris (CASIA-V 1.0, CASIA-V3-Interval, IITD and SDUMLA-HMT) | 2.40 GHz Intel i7 processor with 16 GB RAM. | Data: binary-valued, 640 to 2560 bits. Time: Encryption—0.003 s. Decryption—0.0008 s. Similarity score calculation—1.19 s. |
Song et al. [71] (2020) | SEAL | Iris (CASIA-Iris) | HP notebook with Intel Core i5-6200U processor. | Data: binary-valued, 2048 bits. Time: Encryption—104.5 ms. Decryption—231.6 ms. |
Torres et al. [72] (2015) | Lattice-based cryptography library written in Java [73] | Iris (BATH) | Intel Core i7-3630QM @ 2.40 GHz with 16 GB RAM. | Data: binary-valued, 2048 bits. Time: Key generation—26.649 s. Encryption—3.8 min. Decryption plus comparison—0.49 s. |
Luo et al. [74] (2009) | Paillier cryptosystem | Iris (CASIA-Iris) | Linux machine with AMD Athlon 64, 2.4 GHz and 2 GB memory. | Data: binary-valued, 9600 bits. Time: Encryption—289.922 s. Decryption—17.946 s. Similarity search with threshold comparison—42.189 s. |
Kumar et al. [75] (2020) | - | Iris (CASIA-V3-Interval, IITD and SDUMLA-HMT) | Intel Core i5 processor of 2.50 GHz and 16 GB RAM. | Data: binary-valued, 1280 to 2560 bits. Time: Distance calculation—6.0254 s. |
Scheme (Year) | HE Library | Trait (Database) | System/Hardware Specification | Comparison on Data Type or Format, Data Size and Optimal Computing Time |
---|---|---|---|---|
Yang et al. [79] (2020) | Python-Paillier | Fingerprint (FVC2002 DB2) | Desktop with AMD processor AMD FX-8370 8-Core Processor @ 4.01 GHz with 24GB RAM. | Data: binary-valued, 300 to 600 bits. Time: Key generation—1.7 s. Encryption of 300 bits—2.1 min. Comparison—3 s. |
Barni et al. [80] (2010) | - | Fingerprint (dataset from Microtechnology) | PC with 2.4 GHz CPU and 4 GB RAM. | Data: floating point, 640 dimensions. Time: Single identification transaction—37.43 s. |
Lin et al. [81] (2022) | HElib | Gait (CASIA-B) | - | Data: no information. Time: no information. |
Scheme (Year) | HE Library | Trait (Database) | System/Hardware Specification | Comparison on Data Type or Format, Data Size and Optimal Computing Time |
---|---|---|---|---|
Rahulamathavan [83] (2022) | TenSEAL and SEAL | Voice (TIMIT) | Razor laptop with 16 GB RAM and 6 cores (12 CPUs) @ 4.1 GHz (max). | Data: binary-valued, 1024 to 32,768 bits. Time: Encryption—between 11 ms and 55 ms. Decryption—between 1 ms and 12 ms. Verification—1.3 s. |
Nautsch et al. [84] (2018) | Python-Paillier | Voice (NIST Machine Learning Challenge Phase III Database) | - | Data: double floating-point, 600 dimensions. Time: no information. |
Barrero et al. [86] (2016) | Java-Paillier | Signature (DS2 BioSecure Multimodal database) | Intel Core i7 with four 2.67 GHz cores | Data: real-valued, 200 dimensions. Time: Single comparison bout—0.1 ms. |
Scheme (Year) | HE Library | Trait (Database) | System/Hardware Specification | Comparison on Data Type or Format, Data Size and Optimal Computing Time |
---|---|---|---|---|
Vallabhadas et al. [88] (2022) | SEAL | Fingerprint and iris (Children Multimodal Biometric Database) | - | Data: binary-valued, 2560 bits (iris) + 1024 bits (fingerprint). Time: no information. |
Salem et al. [89] (2018) | Paillier | Fingerprint and iris (CASIA fingerprint and iris datasets) | - | Data: no information. Time: no information. |
Barrero et al. [90] (2017) | Java-Paillier | Signature and fingerprint (BiosecurID DB) | Intel Core i7 with four 2.67 GHz cores. | Data: no information. Time: Comparison—0.5 ms. |
Sperling et al. [91] (2022) | SEAL | Face and voice (CPLFW and Google Speech Commands) | - | Data: floating-point, 512 dimensions (voice) + 512 dimensions (face). Time: Score calculation per match—2.75 ms. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yang, W.; Wang, S.; Cui, H.; Tang, Z.; Li, Y. A Review of Homomorphic Encryption for Privacy-Preserving Biometrics. Sensors 2023, 23, 3566. https://doi.org/10.3390/s23073566
Yang W, Wang S, Cui H, Tang Z, Li Y. A Review of Homomorphic Encryption for Privacy-Preserving Biometrics. Sensors. 2023; 23(7):3566. https://doi.org/10.3390/s23073566
Chicago/Turabian StyleYang, Wencheng, Song Wang, Hui Cui, Zhaohui Tang, and Yan Li. 2023. "A Review of Homomorphic Encryption for Privacy-Preserving Biometrics" Sensors 23, no. 7: 3566. https://doi.org/10.3390/s23073566
APA StyleYang, W., Wang, S., Cui, H., Tang, Z., & Li, Y. (2023). A Review of Homomorphic Encryption for Privacy-Preserving Biometrics. Sensors, 23(7), 3566. https://doi.org/10.3390/s23073566