ABSTRACT
A Fuzzy Vault is a cryptographic structure where a secret is being locked by a key and can be unlocked only by another key with significant overlap. In this paper, we introduce a two-party privacy-preserving approximate string matching methodology based on a novel Fuzzy Vault scheme, combining the approximation and security properties of Fuzzy Vaults for privacy-preserving record linkage purposes.
- Luca Bonomi, Yingxiang Huang, and Lucila Ohno-Machado. 2020. Privacy challenges and research opportunities for genomic data sharing. Nature Genetics (2020), 1--9.Google Scholar
- Feng Chen, Xiaoqian Jiang, Shuang Wang, Lisa M Schilling, Daniella Meeker, Toan Ong, Michael E Matheny, Jason N Doctor, Lucila Ohno-Machado, and Jaideep Vaidya. 2018. Perfectly secure and efficient two-party electronic-health-record linkage. IEEE internet computing 22, 2 (2018), 32--41.Google ScholarCross Ref
- Yanling Chen. 2020. Current approaches and challenges for the two-party privacy-preserving record linkage (PPRL). In Collaborative Technologies and Data Science in Artificial Intelligence Applications. 108--116.Google Scholar
- T Charles Clancy, Negar Kiyavash, and Dennis J Lin. 2003. Secure smartcardbased fingerprint authentication. In Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications. 45--52.Google ScholarDigital Library
- Samuel Daniel Conte and Carl De Boor. 2017. Elementary numerical analysis: an algorithmic approach. SIAM. 31--41 pages.Google Scholar
- Fred J Damerau. 1964. A technique for computer detection and correction of spelling errors. Commun. ACM 7, 3 (1964), 171--176.Google ScholarDigital Library
- Aleksander Essex. 2019. Secure Approximate String Matching for Privacy-Preserving Record Linkage. IEEE Transactions on Information Forensics and Security 14, 10 (2019), 2623--2632.Google ScholarCross Ref
- Michael T Goodrich. 2009. The mastermind attack on genomic data. In 2009 30th IEEE Symposium on Security and Privacy. IEEE, 204--218.Google ScholarDigital Library
- Ari Juels and Madhu Sudan. 2006. A fuzzy vault scheme. Designs, Codes and Cryptography 38, 2 (2006), 237--257.Google ScholarDigital Library
- Basit Khurram and Florian Kerschbaum. 2020. SFour: A Protocol for Cryptographically Secure Record Linkage at Scale. In 2020 IEEE 36th International Conference on Data Engineering (ICDE). IEEE, 277--288.Google ScholarCross Ref
- Vladimir Levenshtein. 1965. Binary codes capable of correcting spurious insertions and deletion of ones. Problems of information Transmission 1, 1 (1965), 8--17.Google Scholar
- Chaoyi Pang, Lifang Gu, David Hansen, and Anthony Maeder. 2009. Privacy-preserving fuzzy matching using a public reference table. In Intelligent Patient Management. Springer, 71--89.Google Scholar
- Wendy Ponce-Hernandez, Ramon Blanco-Gonzalo, Judith Liu-Jimenez, and Raul Sanchez-Reillo. 2020. Fuzzy Vault Scheme Based on Fixed-Length Templates Applied to Dynamic Signature Verification. IEEE Access 8 (2020), 11152--11164.Google ScholarCross Ref
- Ahsan Saleem, Abid Khan, Furqan Shahid, M Masoom Alam, and Muhammad Khurram Khan. 2018. Recent advancements in garbled computing: how far have we come towards achieving secure, efficient and reusable garbled circuits. Journal of Network and Computer Applications 108 (2018), 1--19.Google ScholarDigital Library
- Walter J Scheirer and Terrance E Boult. 2007. Cracking fuzzy vaults and biometric encryption. In 2007 Biometrics Symposium. IEEE, 1--6.Google ScholarCross Ref
- Umut Uludag, Sharath Pankanti, and Anil K Jain. 2005. Fuzzy vault for fingerprints. In International Conference on Audio-and Video-Based Biometric Person Authentication. Springer, 310--319.Google ScholarDigital Library
- Dinusha Vatsalan, Ziad Sehili, Peter Christen, and Erhard Rahm. 2017. Privacy-preserving record linkage for big data: Current approaches and research challenges. In Handbook of Big Data Technologies. Springer, 851--895.Google Scholar
- A two-party private string matching fuzzy vault scheme
Recommendations
Biometric Template Protection with Fuzzy Vault and Fuzzy Commitment
ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive StrategiesConventional security methods like password and ID card methods are now rapidly replacing by biometrics for identification of a person. Biometrics uses physiological or behavioral characteristics of a person. Usage of biometric raises critical privacy ...
A novel fuzzy vault scheme based on fingerprint and finger vein feature fusion
Template security is a critical issue in biometric systems. As we know, our biometrics will not change when we reach adulthood. What will happen if our biometric template is lost or stolen? The classical fuzzy vault scheme uses a single biological ...
A Key Sharing Fuzzy Vault Scheme
Information and Communications SecurityAbstractBased on the classical fuzzy vault and the Diffie-Hellman key exchange scheme, a key sharing fuzzy vault scheme is proposed. In this fuzzy vault scheme, the two users cooperatively build their shared fuzzy vault with a shared key hidden in it ...
Comments