Auflistung nach Schlagwort "Private Information Retrieval"
1 - 2 von 2
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragA survey of distributed biometric authentication systems(BIOSIG 2009: biometrics and electronic signatures, 2009) Sarier, Neyire DenizIn ACISP'07, Bringer et al proposed a new approach for remote biometric based verification, which consists of a hybrid protocol that distributes the server side functionality in order to detach the biometric data storage from the service provider. Besides, a new security model is defined using the notions of Identity and Transaction Privacy, which guarantees the privacy of the identity-biometrics relationship under the assumption of non-colluding servers. In this survey, we review the scheme of Bringer et al and the following biometric verification systems that improve upon it in terms of computation and communication complexity. In this context, we discuss about the recent result of Sarier, which describes a secure and efficient multi-factor authentication scheme with a different biometric storage method that results in reduced computation and database storage cost.
- ZeitschriftenartikelTowards practical privacy-preserving protocols(it - Information Technology: Vol. 64, No. 1-2, 2022) Demmler, DanielProtecting users’ privacy in digital systems becomes more complex and challenging over time, as the amount of stored and exchanged data grows steadily and systems become increasingly involved and connected. Two techniques that try to approach this issue are the privacy-preserving protocols secure multi-party computation (MPC) and private information retrieval (PIR), which aim to enable practical computation while simultaneously keeping sensitive data private. In the dissertation [Daniel Demmler. “Towards Practical Privacy-Preserving Protocols”. Diss. Darmstadt: Technische Universität, 2018. url: http://tuprints.ulb.tu-darmstadt.de/8605/], summarized in this article, we present results showing how real-world applications can be executed in a privacy-preserving way. This is not only desired by users of such applications, but since 2018 also based on a strong legal foundation with the GDPR in the European Union, that enforces privacy protection of user data by design.