4 CONCLUSIONS
In this paper we informally defined a new two party
computation on private sets. We also proposed a
fairly efficient work-in-progress protocol that solves
it. Moreover, we describe how to apply the protocol
to biometric based authentication systems and solve
some existing problems, e.g. reliance on the hard-
ware used by the system user. Future work involves a
formal model of the (t, n)-Threshold Subset Problem,
sound security proofs in this model and test imple-
mentation of the solution.
REFERENCES
Barni, M., Bianchi, T., Catalano, D., Di Raimondo, M.,
Donida Labati, R., Failla, P., Fiore, D., Lazzeretti, R.,
Piuri, V., Scotti, F., and Piva, A. (2010a). Privacy-
preserving Fingercode Authentication. In Proceed-
ings of the 12th ACM Workshop on Multimedia and
Security, MM&Sec ’10, pages 231–240, New
York, NY, USA. ACM.
Barni, M., Bianchi, T., Catalano, D., Raimondo, M. D., La-
bati, R. D., Failla, P., Fiore, D., Lazzeretti, R., Pi-
uri, V., Piva, A., and Scotti, F. (2010b). A privacy-
compliant fingerprint recognition system based on ho-
momorphic encryption and Fingercode templates. In
Biometrics: Theory Applications and Systems (BTAS),
2010 Fourth IEEE International Conference on, pages
1–7.
Bloom, B. H. (1970). Space/time trade-offs in hash cod-
ing with allowable errors. Commun. ACM, 13(7):422–
426.
Bringer, J., Chabanne, H., Kevenaar, T. A. M., and Kin-
darji, B. (2009). Extending Match-on-card to Local
Biometric Identification. In Proceedings of the 2009
Joint COST 2101 and 2102 International Conference
on Biometric ID Management and Multimodal Com-
munication, BioID MultiComm’09, pages 178–186,
Berlin, Heidelberg. Springer-Verlag.
Cristofaro, E. D., Gasti, P., and Tsudik, G. (2011). Fast
and private computation of cardinality of set intersec-
tion and union. Cryptology ePrint Archive, Report
2011/141. http://eprint.iacr.org/.
Cristofaro, E. D. and Tsudik, G. (2009). Practical private set
intersection protocols with linear computational and
bandwidth complexity. Cryptology ePrint Archive,
Report 2009/491. http://eprint.iacr.org/.
Kissner, L. and Song, D. (2005). Advances in Cryptology
– CRYPTO 2005: 25th Annual International Cryp-
tology Conference, Santa Barbara, California, USA,
August 14-18, 2005. Proceedings, chapter Privacy-
Preserving Set Operations, pages 241–257. Springer
Berlin Heidelberg, Berlin, Heidelberg.
Labati, R. D., Piuri, V., and Scotti, F. (2012). E-Business
and Telecommunications: International Joint Confer-
ence, ICETE 2011, Seville, Spain, July 18-21, 2011,
Revised Selected Papers, chapter Biometric Privacy
Protection: Guidelines and Technologies, pages 3–19.
Springer Berlin Heidelberg, Berlin, Heidelberg.
Lee, C. and Kim, J. (2010). Cancelable fingerprint tem-
plates using minutiae-based bit-strings. J. Network
and Computer Applications, 33(3):236–246.
Naor, M. and Pinkas, B. (1999). Oblivious transfer and
polynomial evaluation. In Proceedings of the Thirty-
first Annual ACM Symposium on Theory of Comput-
ing, STOC ’99, pages 245–254, New York, NY, USA.
ACM.
Prabhakar, S. (2001). Fingerprint Classification and Match-
ing Using a Filterbank. PhD thesis, Michigan State
University, Computer Science & Engineering. 259
pages.
Sarier, N. D. (2015). Information Security Theory and Prac-
tice: 9th IFIP WG 11.2 International Conference,
WISTP 2015, Heraklion, Crete, Greece, August 24-
25, 2015. Proceedings, chapter Private Minutia-Based
Fingerprint Matching, pages 52–67. Springer Interna-
tional Publishing, Cham.
Socek, D., Culibrk, D., and Bozovic, V. (2007). Practical
secure biometrics using set intersection as a similar-
ity measure. In SECRYPT 2007, Proceedings of the
International Conference on Security and Cryptogra-
phy, Barcelona, Spain, July 28-13, 2007, pages 25–32.
Sutcu, Y., Li, Q., and Memon, N. (2007). Secure biomet-
ric templates from fingerprint-face features. In Com-
puter Vision and Pattern Recognition, 2007. CVPR
’07. IEEE Conference on, pages 1–6.
Computations on Private Sets and their Application to Biometric based Authentication Systems
457