Delegating Biometric Authentication with the Sumcheck Protocol View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2016-09-17

AUTHORS

Hervé Chabanne , Julien Keuffer , Roch Lescuyer

ABSTRACT

In this paper, we apply the Sumcheck protocol to verify the Euclidean (resp. Hamming) distance computation in the case of facial (resp. iris) recognition. In particular, we consider a border crossing use case where, thanks to an interactive protocol, we delegate the authentication to the traveller. Verifiable computation aims to give the result of a computation and a proof of its correctness. In our case, the traveller takes over the authentication process and makes a proof that he did it correctly leaving to the authorities to check its validity. We integrate privacy preserving techniques to avoid that an eavesdropper gets information about the biometric data of the traveller during his interactions with the authorities. We provide implementation figures for our proposal showing that it is practical. More... »

PAGES

236-244

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-45931-8_15

DOI

http://dx.doi.org/10.1007/978-3-319-45931-8_15

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1024185027


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Safran Identity & Security, T\u00e9l\u00e9com ParisTech, Issy-Les-Moulineaux, France", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Safran Identity & Security, T\u00e9l\u00e9com ParisTech, Issy-Les-Moulineaux, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Chabanne", 
        "givenName": "Herv\u00e9", 
        "id": "sg:person.015205413777.51", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015205413777.51"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Safran Identity & Security, Eurecom, Issy-Les-Moulineaux, France", 
          "id": "http://www.grid.ac/institutes/grid.423851.9", 
          "name": [
            "Safran Identity & Security, Eurecom, Issy-Les-Moulineaux, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Keuffer", 
        "givenName": "Julien", 
        "id": "sg:person.016007512540.26", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016007512540.26"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Safran Identity & Security, Issy-Les-Moulineaux, France", 
          "id": "http://www.grid.ac/institutes/grid.423851.9", 
          "name": [
            "Safran Identity & Security, Issy-Les-Moulineaux, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Lescuyer", 
        "givenName": "Roch", 
        "id": "sg:person.013634526575.19", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013634526575.19"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2016-09-17", 
    "datePublishedReg": "2016-09-17", 
    "description": "In this paper, we apply the Sumcheck protocol to verify the Euclidean (resp. Hamming) distance computation in the case of facial (resp. iris) recognition. In particular, we consider a border crossing use case where, thanks to an interactive protocol, we delegate the authentication to the traveller. Verifiable computation aims to give the result of a computation and a proof of its correctness. In our case, the traveller takes over the authentication process and makes a proof that he did it correctly leaving to the authorities to check its validity. We integrate privacy preserving techniques to avoid that an eavesdropper gets information about the biometric data of the traveller during his interactions with the authorities. We provide implementation figures for our proposal showing that it is practical.", 
    "editor": [
      {
        "familyName": "Foresti", 
        "givenName": "Sara", 
        "type": "Person"
      }, 
      {
        "familyName": "Lopez", 
        "givenName": "Javier", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-45931-8_15", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-319-45930-1", 
        "978-3-319-45931-8"
      ], 
      "name": "Information Security Theory and Practice", 
      "type": "Book"
    }, 
    "keywords": [
      "Euclidean distance computations", 
      "verifiable computation", 
      "authentication process", 
      "biometric authentication", 
      "interactive protocol", 
      "use cases", 
      "distance computation", 
      "facial recognition", 
      "biometric data", 
      "implementation figures", 
      "authentication", 
      "computation", 
      "privacy", 
      "protocol", 
      "correctness", 
      "eavesdropper", 
      "proof", 
      "recognition", 
      "information", 
      "proposal", 
      "travelers", 
      "thanks", 
      "technique", 
      "data", 
      "process", 
      "authorities", 
      "results", 
      "cases", 
      "validity", 
      "interaction", 
      "figures", 
      "paper"
    ], 
    "name": "Delegating Biometric Authentication with the Sumcheck Protocol", 
    "pagination": "236-244", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1024185027"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-45931-8_15"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-45931-8_15", 
      "https://app.dimensions.ai/details/publication/pub.1024185027"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-05-20T07:47", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/chapter/chapter_396.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-319-45931-8_15"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-45931-8_15'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-45931-8_15'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-45931-8_15'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-45931-8_15'


 

This table displays all metadata directly associated to this object as RDF triples.

116 TRIPLES      23 PREDICATES      57 URIs      50 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-45931-8_15 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author Nf455610593734afa885a9ae254df01dd
4 schema:datePublished 2016-09-17
5 schema:datePublishedReg 2016-09-17
6 schema:description In this paper, we apply the Sumcheck protocol to verify the Euclidean (resp. Hamming) distance computation in the case of facial (resp. iris) recognition. In particular, we consider a border crossing use case where, thanks to an interactive protocol, we delegate the authentication to the traveller. Verifiable computation aims to give the result of a computation and a proof of its correctness. In our case, the traveller takes over the authentication process and makes a proof that he did it correctly leaving to the authorities to check its validity. We integrate privacy preserving techniques to avoid that an eavesdropper gets information about the biometric data of the traveller during his interactions with the authorities. We provide implementation figures for our proposal showing that it is practical.
7 schema:editor N2b580146474d4c3e9e83f7574f95747d
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf N5a84999ae0db4c648310ae4a3db2c2ff
12 schema:keywords Euclidean distance computations
13 authentication
14 authentication process
15 authorities
16 biometric authentication
17 biometric data
18 cases
19 computation
20 correctness
21 data
22 distance computation
23 eavesdropper
24 facial recognition
25 figures
26 implementation figures
27 information
28 interaction
29 interactive protocol
30 paper
31 privacy
32 process
33 proof
34 proposal
35 protocol
36 recognition
37 results
38 technique
39 thanks
40 travelers
41 use cases
42 validity
43 verifiable computation
44 schema:name Delegating Biometric Authentication with the Sumcheck Protocol
45 schema:pagination 236-244
46 schema:productId N1391e83816874b409bd868a5944b5325
47 N9fd2447787134a5a8eb603a488da1d9d
48 schema:publisher N4fb7f0c8ad7948eb9b4d1bcf2c878096
49 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024185027
50 https://doi.org/10.1007/978-3-319-45931-8_15
51 schema:sdDatePublished 2022-05-20T07:47
52 schema:sdLicense https://scigraph.springernature.com/explorer/license/
53 schema:sdPublisher N61594ddf63604857a54f93ac7bdac875
54 schema:url https://doi.org/10.1007/978-3-319-45931-8_15
55 sgo:license sg:explorer/license/
56 sgo:sdDataset chapters
57 rdf:type schema:Chapter
58 N05698580b95140238e00000bc8f1ddcf rdf:first N24346ade367c4b569438a96063f12f19
59 rdf:rest rdf:nil
60 N0f8aa105767640b2b8b3b327c60b9f43 rdf:first sg:person.016007512540.26
61 rdf:rest N5a0c069e475d46dc805d7692a93b879c
62 N1391e83816874b409bd868a5944b5325 schema:name doi
63 schema:value 10.1007/978-3-319-45931-8_15
64 rdf:type schema:PropertyValue
65 N24346ade367c4b569438a96063f12f19 schema:familyName Lopez
66 schema:givenName Javier
67 rdf:type schema:Person
68 N2b580146474d4c3e9e83f7574f95747d rdf:first Nd3ae2335f2514e0b87c09d28b51b93b2
69 rdf:rest N05698580b95140238e00000bc8f1ddcf
70 N4fb7f0c8ad7948eb9b4d1bcf2c878096 schema:name Springer Nature
71 rdf:type schema:Organisation
72 N5a0c069e475d46dc805d7692a93b879c rdf:first sg:person.013634526575.19
73 rdf:rest rdf:nil
74 N5a84999ae0db4c648310ae4a3db2c2ff schema:isbn 978-3-319-45930-1
75 978-3-319-45931-8
76 schema:name Information Security Theory and Practice
77 rdf:type schema:Book
78 N61594ddf63604857a54f93ac7bdac875 schema:name Springer Nature - SN SciGraph project
79 rdf:type schema:Organization
80 N9fd2447787134a5a8eb603a488da1d9d schema:name dimensions_id
81 schema:value pub.1024185027
82 rdf:type schema:PropertyValue
83 Nd3ae2335f2514e0b87c09d28b51b93b2 schema:familyName Foresti
84 schema:givenName Sara
85 rdf:type schema:Person
86 Nf455610593734afa885a9ae254df01dd rdf:first sg:person.015205413777.51
87 rdf:rest N0f8aa105767640b2b8b3b327c60b9f43
88 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
89 schema:name Information and Computing Sciences
90 rdf:type schema:DefinedTerm
91 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
92 schema:name Data Format
93 rdf:type schema:DefinedTerm
94 sg:person.013634526575.19 schema:affiliation grid-institutes:grid.423851.9
95 schema:familyName Lescuyer
96 schema:givenName Roch
97 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013634526575.19
98 rdf:type schema:Person
99 sg:person.015205413777.51 schema:affiliation grid-institutes:None
100 schema:familyName Chabanne
101 schema:givenName Hervé
102 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015205413777.51
103 rdf:type schema:Person
104 sg:person.016007512540.26 schema:affiliation grid-institutes:grid.423851.9
105 schema:familyName Keuffer
106 schema:givenName Julien
107 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016007512540.26
108 rdf:type schema:Person
109 grid-institutes:None schema:alternateName Safran Identity & Security, Télécom ParisTech, Issy-Les-Moulineaux, France
110 schema:name Safran Identity & Security, Télécom ParisTech, Issy-Les-Moulineaux, France
111 rdf:type schema:Organization
112 grid-institutes:grid.423851.9 schema:alternateName Safran Identity & Security, Eurecom, Issy-Les-Moulineaux, France
113 Safran Identity & Security, Issy-Les-Moulineaux, France
114 schema:name Safran Identity & Security, Eurecom, Issy-Les-Moulineaux, France
115 Safran Identity & Security, Issy-Les-Moulineaux, France
116 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...