Visible to the public Biblio

Filters: Author is Morel, Constance  [Clear All Filters]
2017-10-04
Bringer, Julien, El Omri, Othmane, Morel, Constance, Chabanne, Hervé.  2016.  Boosting GSHADE Capabilities: New Applications and Security in Malicious Setting. Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies. :203–214.

The secure two-party computation (S2PC) protocols SHADE and GSHADE have been introduced by Bringer et al. in the last two years. The protocol GSHADE permits to compute different distances (Hamming, Euclidean, Mahalanobis) quite efficiently and is one of the most efficient compared to other S2PC methods. Thus this protocol can be used to efficiently compute one-to-many identification for several biometrics data (iris, face, fingerprint). In this paper, we introduce two extensions of GSHADE. The first one enables us to evaluate new multiplicative functions. This way, we show how to apply GSHADE to a classical machine learning algorithm. The second one is a new proposal to secure GSHADE against malicious adversaries following the recent dual execution and cut-and-choose strategies. The additional cost is very small. By preserving the GSHADE's structure, our extensions are very efficient compared to other S2PC methods.