SHADE: Secure HAmming DistancE Computation from Oblivious Transfer

The authors introduce two new schemes for securely computing Hamming distance in the two-party setting; very efficient protocol, based solely on 1-out-of-2 oblivious transfer that achieves full security in the semi-honest setting and one-sided security in the malicious setting. Moreover they show that this protocol is significantly more efficient than the previous proposals that are either based on garbled circuits or on homomorphic encryption and full security against malicious adversaries and is based on committed oblivious transfer. These protocols have direct applications to secure biometric identification.

Provided by: Telecom of New Zealand Topic: Security Date Added: Oct 2012 Format: PDF

Find By Topic