TR2009-070

Secure Distortion Computation Among Untrusting Parties Using Homomorphic Encryption


    •  Rane, S.D., Sun, W., Vetro, A., "Secure Distortion Computation Among Untrusting Parties Using Homomorphic Encryption", IEEE International Conference on Image Processing (ICIP), DOI: 10.1109/​ICIP.2009.5414544, November 2009, pp. 1485-1588.
      BibTeX TR2009-070 PDF
      • @inproceedings{Rane2009nov,
      • author = {Rane, S.D. and Sun, W. and Vetro, A.},
      • title = {Secure Distortion Computation Among Untrusting Parties Using Homomorphic Encryption},
      • booktitle = {IEEE International Conference on Image Processing (ICIP)},
      • year = 2009,
      • pages = {1485--1588},
      • month = nov,
      • doi = {10.1109/ICIP.2009.5414544},
      • url = {https://www.merl.com/publications/TR2009-070}
      • }
  • MERL Contact:
  • Research Area:

    Information Security

Abstract:

Alice and Bob possess sequences xn and yn respectively and would like to compute d(xn,yn) where d(.,.) is a distortion measure. However, Alice and Bob do not trust each other and do not wish to reveal their data to each other. This paper describes and analyzes a protocol that uses homomorphic encryption for secure calculation of some special distortion functions without revealing xn and yn. The resulting distortion result is also in encrypted form. Two variants of the protocol are presented, one for the Hamming distance between binary vectors, and other for squared errors distortion between integer vectors. An application of the protocol for private biometric authentication is described in which Bob interacts with a remote encrypted fingerprint database (Alice) to achieve access control without revealing his own identity.

 

  • Related News & Events

    •  NEWS   ICIP 2009: 2 publications by Wei Sun, Anthony Vetro and Shantanu D. Rane
      Date: November 7, 2009
      Where: IEEE International Conference on Image Processing (ICIP)
      MERL Contact: Anthony Vetro
      Brief
      • The papers "Object Detection via Boosted Deformable Features" by Hussein, M.E., Porikli, F.M. and Davis, L. and "Secure Distortion Computation between Untrusting Parties using Homomorphic Encryption" by Rane, S.D., Sun, W. and Vetro, A. were presented at the IEEE International Conference on Image Processing (ICIP).
    •