Visible to the public Boosting GSHADE Capabilities: New Applications and Security in Malicious Setting

TitleBoosting GSHADE Capabilities: New Applications and Security in Malicious Setting
Publication TypeConference Paper
Year of Publication2016
AuthorsBringer, Julien, El Omri, Othmane, Morel, Constance, Chabanne, Hervé
Conference NameProceedings of the 21st ACM on Symposium on Access Control Models and Technologies
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-3802-8
KeywordsAdversary Models, biometrics, gshade, Human Behavior, malicious adversaries, pubcrawl, Resiliency, scalabilty, secure two-party computation, semi-honest adversaries
Abstract

The secure two-party computation (S2PC) protocols SHADE and GSHADE have been introduced by Bringer et al. in the last two years. The protocol GSHADE permits to compute different distances (Hamming, Euclidean, Mahalanobis) quite efficiently and is one of the most efficient compared to other S2PC methods. Thus this protocol can be used to efficiently compute one-to-many identification for several biometrics data (iris, face, fingerprint). In this paper, we introduce two extensions of GSHADE. The first one enables us to evaluate new multiplicative functions. This way, we show how to apply GSHADE to a classical machine learning algorithm. The second one is a new proposal to secure GSHADE against malicious adversaries following the recent dual execution and cut-and-choose strategies. The additional cost is very small. By preserving the GSHADE's structure, our extensions are very efficient compared to other S2PC methods.

URLhttp://doi.acm.org/10.1145/2914642.2914658
DOI10.1145/2914642.2914658
Citation Keybringer_boosting_2016