A Practical Privacy-Preserving Face Authentication Scheme with Revocability and Reusability
Revocability and reusability are important properties in an authentication scheme in reality. The former requires that the user credential stored in the authentication server be easily replaced if it is compromised while the latter allows the credentials of the same user to appear independent in cross-domain applications. However, the invariable biometrics features in the face authentication poses a great challenge to accomplishing these two properties. Existing solutions either sacrifice the accuracy of the authentication result or rely on a trusted third party. In this paper, we propose a novel privacy-preserving face authentication scheme without the assistance of an additional server, which achieves both revocability and reusability as well as the same accuracy level of the plaintext face recognition that uses Euclidean distance measure. Moreover, we rigorously analyze the security of our scheme using the simulation technique and conduct the experiment on a real-world dataset to demonstrate its efficiency. We report that a successful user authentication costs less than a second on a smartphone with common specs.
KeywordsFace authentication Revocability Reusability
This work is supported by the National Key Research and Development Program of China under Grant 2016YFB0800601, the Key Program of NSFC-Tongyong Union Foundation under Grant U1636209 and the Key Basic Research Plan in Shaanxi Province under Grant 2017ZDXM-GY-014.
- 1.Casia-webface-database. http://www.cbsr.ia.ac.cn/english/Databases.asp
- 2.Smile to pay. https://www.antfin.com/report.htm. Accessed 16 Mar 2015
- 3.Your face is your secure password. https://www.apple.com/iphone-x/#face-id
- 4.Boyen, X.: Reusable cryptographic fuzzy extractors. In: Proceedings of the 11th ACM Conference on Computer and Communications Security. ACM (2004)Google Scholar
- 16.Matsuda, T., Takahashi, K., Murakami, T., Hanaoka, G.: Fuzzy signatures: relaxing requirements and a new construction. In: Manulis, M., Sadeghi, A.R., Schneider, S. (eds.) ACNS 2016. LNCS, vol. 9696, pp. 97–116. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-39555-5_6CrossRefzbMATHGoogle Scholar
- 17.Ouyang, W., et al.: DeepID-Net: deformable deep convolutional neural networks for object detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2015)Google Scholar
- 22.Sun, Y., Liang, D., Wang, X., Tang, X.: Deepid3: face recognition with very deep neural networks. arXiv preprint arXiv:1502.00873 (2015)
- 23.Sun, Y., Wang, X., Tang, X.: Deep learning face representation from predicting 10,000 classes. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2014)Google Scholar
- 24.Takahashi, K., Matsuda, T., Murakami, T., Hanaoka, G., Nishigaki, M.: A signature scheme with a fuzzy private key. In: Malkin, T., Kolesnikov, V., Lewko, A.B., Polychronakis, M. (eds.) ACNS 2015. LNCS, vol. 9092, pp. 105–126. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-28166-7_6CrossRefGoogle Scholar
- 28.Zhuang, D., Wang, S., Chang, J.M.: FRiPAL: face recognition in privacy abstraction layer. In: 2017 IEEE Conference on Dependable and Secure Computing. IEEE (2017)Google Scholar