2023
DOI: 10.3390/inventions8040102
|View full text |Cite
|
Sign up to set email alerts
|

A Comparative Assessment of Homomorphic Encryption Algorithms Applied to Biometric Information

Abstract: This paper provides preliminary research regarding the implementation and evaluation of a hybrid mechanism of authentication based on fingerprint recognition interconnected with RFID technology, using Arduino modules, that can be deployed in different scenarios, including secret classified networks. To improve security, increase efficiency, and enhance convenience in the process of authentication, we perform a comparative assessment between two homomorphic encryption algorithms, the Paillier partial homomorphi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…In the last phase, decryption implies the existence of a ciphertext (ct) that needs to be decrypted, using a private key (sk) from which the original message is obtained: Decrypt(ct, sk) → pt. Another important step described by [56] includes the evaluation of the homomorphic circuit that encompasses the development of a supplementary function over the ciphertexts (ct 1 , ct 2 ) without seeing the messages (pt 1 , pt 2 ), which takes ciphertexts as input points from which the evaluated ciphertexts result. The encryption scheme comprises four main operations, namely KeyGen, Encrypt, Decrypt, Evaluate, for circuit C, considering the input parameter t, the encryption key pair (sk, pk) generated via the KeyGen function, the plaintext messages pt = (pt 1 , pt 2 .…”
Section: Methodsmentioning
confidence: 99%
“…In the last phase, decryption implies the existence of a ciphertext (ct) that needs to be decrypted, using a private key (sk) from which the original message is obtained: Decrypt(ct, sk) → pt. Another important step described by [56] includes the evaluation of the homomorphic circuit that encompasses the development of a supplementary function over the ciphertexts (ct 1 , ct 2 ) without seeing the messages (pt 1 , pt 2 ), which takes ciphertexts as input points from which the evaluated ciphertexts result. The encryption scheme comprises four main operations, namely KeyGen, Encrypt, Decrypt, Evaluate, for circuit C, considering the input parameter t, the encryption key pair (sk, pk) generated via the KeyGen function, the plaintext messages pt = (pt 1 , pt 2 .…”
Section: Methodsmentioning
confidence: 99%
“…The main goal is to assess how well reservoir computing techniques for encrypting and decrypting digital images increase security safeguards against potential attackers. Reservoir computing is not limited to picture encryption; it may also improve financial prediction accuracy by integrating hyperchaotic models into this framework (Crihan et al, 2023).…”
Section: Introductionmentioning
confidence: 99%