Redirigiendo al acceso original de articulo en 22 segundos...
Inicio  /  Information  /  Vol: 15 Par: 3 (2024)  /  Artículo
ARTÍCULO
TITULO

A Secure Face Verification Scheme Based on Fully Homomorphic Encryption with Anonymity

Xingchen Wang and Peng Li    

Resumen

With the widespread adoption of cloud computing, the face verification process often requires the client to upload the face to an untrusted cloud server to obtain the verification results. Privacy leakage issues may arise if the client?s private information is not protected. This paper proposes a secure and anonymous face verification scheme using fully homomorphic encryption technology and SealPIR. Our scheme is a three-party solution that requires a third-party server trusted by the client. This scheme not only prevents the client?s facial data from being obtained by untrusted data servers but also prevents the data server from learning the index corresponding to the face that the client wants to verify. In a single-face verification process, the client only needs to perform one upload operation and one download operation, with a communication volume of 264 KB. We can complete a privacy-protected anonymous face verification process in 84.91 ms.

 Artículos similares

       
 
Rina Komatsu and Tad Gonsalves    
In CycleGAN, an image-to-image translation architecture was established without the use of paired datasets by employing both adversarial and cycle consistency loss. The success of CycleGAN was followed by numerous studies that proposed new translation mo... ver más
Revista: AI

 
Yukun Zhou, Ningsheng Wu, Baidong Hu, Yitao Zhang, Jingyun Qiu and Weiming Cai    
Face recognition payment is a new type of payment method, with AI face recognition technology as the core, and its speed and convenience are more in line with the users? payment habits. However, the face is a biological feature with weak privacy, and the... ver más
Revista: Information

 
Unai Elordi, Chiara Lunerti, Luis Unzueta, Jon Goenetxea, Nerea Aranjuelo, Alvaro Bertelsen and Ignacio Arganda-Carreras    
In this paper, we tackle the problem of deploying face recognition (FR) solutions in heterogeneous Internet of Things (IoT) platforms. The main challenges are the optimal deployment of deep neural networks (DNNs) in the high variety of IoT devices (e.g.,... ver más
Revista: Information

 
Zhihui Shang, Tao Zhang, Yueming Cai, Weiwei Yang, Hao Wu, Yu Zhang and Liwei Tao    
This paper studies the secure transmission in the dual-hop cognitive wiretap networks, where the secondary transmitter (Alice) aims to transmit confidential information to the secondary receiver (Bob) in the face of a multi-antenna relay (Relay), while t... ver más
Revista: Applied Sciences

 
S. Raja Mohamed, P. Aruna Jeyanthy, D. Devaraj, M. H. Shwehdi and Adel Aldalbahi    
The high penetration level of solar photovoltaic (SPV) generation systems imposes a major challenge to the secure operation of power systems. SPV generation systems are connected to the power grid via power converters. During a fault on the grid side; ov... ver más
Revista: Applied Sciences