[Resource Topic] 2023/1684: Privacy-preserving Cosine Similarity Computation with Malicious Security Applied to Biometric Authentication

Welcome to the resource topic for 2023/1684

Title:
Privacy-preserving Cosine Similarity Computation with Malicious Security Applied to Biometric Authentication

Authors: Nan Cheng, Melek Önen, Aikaterini Mitrokotsa, Oubaïda Chouchane, Massimiliano Todisco, Alberto Ibarrondo

Abstract:

Computing \Delta(\mathbfit{x},\mathbfit{y}) \geq \tau, the distance between two vectors \mathbfit{x} and \mathbfit{y} chained with a comparison to a predefined public threshold \tau, is an essential functionality that is extensively used in privacy-sensitive applications such as biometric authentication and identification, machine learning algorithms ({\em e.g.,} linear regression, k-nearest neighbors etc.) or typo-tolerant password-based authentication. Cosine similarity is one of the most popular distance metrics employed in these settings.
In this paper, we investigate the privacy-preserving computation of cosine similarity in a two-party distributed setting {\em i.e.,} where a client outsources the distance calculation to two servers, while revealing only the result of the comparison to the service provider. We propose two two-party computation (2PC) protocols of cosine similarity followed by comparison to a public threshold, one in the semi-honest and one in the malicious setting. Our protocols combine additive secret sharing with function secret sharing, saving one communication round by employing a new building block to compute the composition of a bit and a binary function f, thus requiring only two communication rounds under a strong threat model. We evaluate our protocols in the setting of biometric authentication using voice biometrics.
Our results show that not only are the proposed protocols efficient, but they also maintain the same accuracy as the plain-text systems.

ePrint: https://eprint.iacr.org/2023/1684

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .