Cryptography 08 00003
Cryptography 08 00003
Cryptography 08 00003
Article
Novel and Efficient Privacy-Preserving Continuous Authentication
Ahmed Fraz Baig 1,2, *, Sigurd Eskeland 1 and Bian Yang 2
1. Introduction
Computing technology is growing rapidly; mobile devices are now commonly used for
different applications and services. The rapid advancement of technology also invites vari-
ous security threats in different domains. Security breaches, including unauthorized access
to user accounts, malware attacks, insider attacks, brute-force attacks, etc., are happening
Citation: Baig, A.F.; Eskeland, S.;
Yang, B. Novel and Efficient
every day. Authentication is considered a fundamental aspect of digital security; it ensures
Privacy-Preserving Continuous
whether the identity claimer is the right person or not. Verifying user identity with a weak
Authentication. Cryptography 2024, 8, authentication mechanism is one of the reasons for such security breaches. User authentica-
3. https://doi.org/10.3390/ tion is usually accomplished in a static way, where the user is authenticated only once at
cryptography8010003 the beginning of a session. Security problems likely occur when the PINs/passwords are
stolen, or the device remains unattended for a while and somebody else uses it. To reduce
Academic Editor: Josef Pieprzyk
security vulnerabilities, a second-factor authentication may be employed so that the user
Received: 12 December 2023 validity can be verified persistently. In this regard, continuous authentication may help to
Revised: 15 January 2024 prevent unauthorized access by continuously authenticating the user during the session.
Accepted: 17 January 2024 It can be accomplished by collecting and monitoring user contextual information such as
Published: 24 January 2024 user physical location by GPS, logical location IP addresses, etc., or authenticating users
using their behavioral traits.
Both behavioral biometrics and context-aware modalities offer passive and seam-
less authentication; therefore, they do not reduce usability. But, sometimes, they may
Copyright: © 2024 by the authors.
face problems, and to address such problems, one should carefully choose the mode of
Licensee MDPI, Basel, Switzerland.
continuous authentication. Different modalities solve different problems; for example,
This article is an open access article
monitoring users by their location data, IP addresses, or other context-aware data only
distributed under the terms and
enhances security when an attacker tries to breach security from a different place with
conditions of the Creative Commons
different devices, etc. Still, the limitation of this particular mechanism is that it gives no
Attribution (CC BY) license (https://
creativecommons.org/licenses/by/
protection when the user leaves the device unattended and an imposter uses it. Behavioral
4.0/).
biometric modalities may overcome this problem because users are authenticated based
on the behavioral patterns they perform while using a device [1]. The limitation can be
overcome because the imposter can be identified immediately. In this regard, keystroke
dynamics or swipe gestures are the most suitable modes for continuous authentication.
Continuous authentication may have different applications, such as it can be used to
secure mobile devices, financial services, IoT and smart homes, E-commerce, healthcare,
cloud-based services, etc. Continuous authentication for such applications is also crucial
because it requires outsourcing user data. Continuous authentication can be performed
locally in the device, but devices have limited storage and computation resources, and there
is a possibility of malicious or compromised client [2,3].
Continuous authentication modalities use user behavioral data such as keystroke
patterns, swipe gestures, gait dynamics, and contextual data, including user location data,
IP addresses, carrier data, user calendars, Bluetooth connectivity, or other personal data [1].
Such data are enormous and contain sensitive information about the user’s appearance,
biometric information, and other user-sensitive and demographic information that may
be induced from such features [4]. Outsourcing such personal data to a third party raises
privacy concerns. These data contain biometric traits and contain identifiable and sensitive
attributes. As per GDPR [5,6], these data must be stored and processed in a privacy-
preserving manner.
Efficiency is another important concern in continuous authentication that requires
attention. Continuous authentication works actively throughout the session; therefore, it
requires low transmission overhead and efficient performance. The privacy-preserving
continuous authentication protocols in the literature are either very inefficient [7,8] or
proven insecure in [9]. For instance, in most cases, the authentication decision is made by
performing many rounds of interaction between the client and the authentication server.
This causes communication and computation overhead, as mentioned in the later Section 8.
Our contribution
To solve privacy and efficiency issues, this article makes the following contributions:
1. Using the additive homomorphic encryption property, we propose two efficient proto-
cols that protect the privacy of user behavioral features (enrollment vector and probe
vector). Protocol 1 assumes an honest client and a malicious authentication server,
and protocol 2 assumes a compromised client and malicious authentication server.
2. Low communication and computation costs. Taking high communication and
computation costs into consideration, we propose very efficient authentication
protocols that avoid rounds of communication between the client and the authenti-
cation server; the protocols complete the authentication in a single unidirectional
(client/server) transmission.
3. The biometric performance (accuracy) of the proposed protocols is the same as is in
the plaintext domain. In other words, there is no degradation in accuracy.
The rest of the paper is organized as follows: we discuss the related work in Section 2; the
preliminaries are discussed in Section 3; the adversarial model is presented in
Section 5; security requirements are discussed in Section 5.4; privacy-preserving protocol 1
is presented in Section 6; an extended protocol, taking a compromised client into account,
is presented in Section 7; computation cost and communication is assessed in Section 8;
a biometric evaluation is shown in Section 9; and Section 10 concludes the paper and
discusses the future work.
2. Related Work
This section presents the literature review of privacy-preserving continuous authen-
tication schemes. We only consider privacy-preserving solutions that utilize only cryp-
tographic primitives to achieve privacy. Govindarajan et al. [7] proposed protocols for
privacy-preserving continuous authentication. They use additive homomorphic encryption
and computed encrypted Scaled Euclidean Distance (SED) and Scaled Manhattan Distance
(SMD) to determine the dissimilarity between a reference template and a fresh input probe.
Cryptography 2024, 8, 3 3 of 14
Safa et al. [10] proposed a generic implicit authentication scheme for contextual data.
They used additive homomorphic encryption accompanied by order-preserving symmetric
encryption. The final result is based on the dissimilarity scores of Average Absolute Devia-
tion (AAD) between the enrollment and probe vector. Domingo-Ferrer et al. [11] presented
an implicit authentication protocol using an additively homomorphic encryption primitive
and computed a private set intersection between a set of enrollment features and a set of
probes. Sitová et al. [8] used the idea of a fuzzy commitment scheme proposed by Juels
and Wattenberg [12] to propose a touch dynamics-based authentication scheme. However,
such techniques face certain limitations related to data reversibility and data distinguisha-
bility and do not achieve privacy [13]. Balagani et al. [14] presented privacy-preserving
keystroke dynamics-based protocols for implicit authentication. Like Govindarajan et al.,
they also used additive homomorphic with a secure comparison protocol presented by
Damgård et al. [15,16].
Acar et al. [17] proposed a second-factor hybrid privacy-preserving authentication
protocol using keystroke dynamics. Their multi-factor authentication mechanism uses two
types of cryptographic primitives: fully homomorphic encryption (FHE) [18] and fuzzy
hashing [19].
Wei et al. [20] proposed a privacy-preserving continuous authentication protocol using
the Paillier cryptosystem. The cosine similarity is used to determine the similarity between
the encrypted reference template and the probe. The enrollment features are encrypted
using the public key of the authentication server, and privacy is achieved using secret
random numbers (secret key), such as each element is blinded with a secret blinding factor
that is only known to the client. However, it is shown by Eskeland and Baig [9] that the
Wei et al. scheme is insecure and not privacy preserving. They showed that the honest and
curious authentication server obtains not only the plaintext of biometric features, but also
the secret key vector. Moreover, they also showed that the Wei et al. scheme is vulnerable
to active adversarial attacks.
Loya and Bana [21] used fully homomorphic encryption proposed by Cheon et al. [22]
with differential privacy to propose a privacy-preserving protocol for keystroke analy-
sis. Their solution trains neural networks utilizing differential privacy and evaluates the
encrypted data.
Baig and Eskeland [23] proposed a privacy-preserving keystroke dynamics-based con-
tinuous authentication that computes penalty and reward functions defined by Bours [24].
Their privacy-preserving solution uses additive homomorphic encryption with a secure
comparison protocol and completes authentication in five rounds.
Baig et al. [25] utilized an oblivious transfer protocol (OT) with homomorphic en-
cryption to propose two privacy-preserving continuous authentication protocols. Their
proposed protocols protect user biometric data and user activities and complete authentica-
tion in four rounds. Their proposed protocols provide communication efficiency as they
compute similarity based on k actions and make interaction after k actions.
3. Preliminaries
This section discusses the building blocks.
Building Blocks
Our privacy-preserving continuous authentication protocols use the following build-
ing blocks:
(a) The Paillier cryptosystem [26,27] can be explained as follows: During a key generation
phase, two large random prime numbers p, q of equal length are selected and RSA product
n = pq is computed.The public and private keys are generated, of which (n, g) is the public
key, where g = 1 + n, and (λ, n) is the private key, where λ = λ(n) = lcm( p − 1, q − 1),
respectively. Encryption is performed as c = (1 + mn)r n mod n2 , where r is chosen ran-
domly in 0 < r < n. Decryption is performed as m = L(cλ mod n2 ) · λ−1 mod n, where L
is a function L( x ) = x− 1
n .
Cryptography 2024, 8, 3 4 of 14
Table 1. Notation.
(b) The cosine similarity. Assume ⃗x = ( x1 , . . . , xm ) and ⃗y = (y1 , . . . , ym ) are two vectors,
where the cosine similarity between (⃗x, ⃗y) is defined as
∑mj =1 x j y j
cos(⃗x, ⃗y) = q q (1)
∑m x
j =1 j
2
∑m 2
j =1 y j
The cosine similarity of 1 indicates that vector ⃗x and vector ⃗y are exactly similar, where 0
indicates complete dissimilarity between two vectors.
Algorithm 1
Enrollment phase
⃗a = (q
a1 , . . . , a m )
A = ∑m j =1 a j
2
x = a j /A, 1 ≤ j ≤ m
⃗x = ( x1 , . . . , xm )
Authentication phase
⃗b = (b1 , . . . , bm )
q
B = ∑m j =1 b j
2
y = b j /B, 1 ≤ j ≤ m
⃗y = (y1 , . . . , ym )
s = ∑m j =1 x j y j
if (s > T ) then
Accept
end if
Authentication
q features ⃗b = (b1 , . . . , bm ) are sampled in the authentication phase,
m 2
where B = ∑ j=1 b j , y j = b j /B, 1 ≤ j ≤ m, are precomputed in the same way as stated
above to construct the probe vector ⃗y = (y1 , . . . , ym ), where m indicates the total elements
in a vector. The cosine similarity s between the template vector ⃗x and the probe vector ⃗y is
computed as a dot product:
Cryptography 2024, 8, 3 5 of 14
m
s = ⃗x · ⃗y = ∑ xj yj (2)
j =1
5. Adversarial Model
Different types of adversaries are considered in biometric authentication systems,
such as malicious parties, semi-honest parties, etc.; malicious parties are considered strong
adversaries, whereas semi-honest parties follow the protocol honestly. The protocols
presented in the later sections do not take external adversaries into account and assume
that communication between the user and the server is secure and that external threats,
such as replay attacks and other similar attacks, are mitigated by applying other security
techniques. Note that the enrollment phase is completed in a trusted environment. The
proposed authentication protocols consider the following adversaries.
x j = a j /A, 1 ≤ j ≤ m
⃗x = ( x1 , . . . , xm )
Generate:
⃗r = (r1 , . . . , rm )
Compute:
c j = gr j (1 + x j n) mod n2 ,
1≤j≤m
⃗c = (c1 , . . . , cm ) ⃗c
−−−−−−−−−−−−−
→
store: ⃗x, ⃗r
Authentication phase
retrieve ⃗r, ⃗x Retrieve ⃗c
⃗b = (b1 , . . . , bm )
q
B = ∑m j =1 b j
2
y j = b j /B, 1 ≤ j ≤ m
k j ∈ Z∗n
dj = yj + k j, 1 ≤ j ≤ m
d⃗ = (d1 , . . . , dm )
− m rd
α = g ∑ j=1 j j mod n2
β = ∑m j=1 x j k j mod n
2 α, β, d⃗
−−−−−−−−−−−−−→
dj
s = α(∏m
j=1 c j ) − βn
s>τ
− ∑m
j =1 r j d j
α=g mod n2
and
m
β= ∑ xj k j mod n2
j =1
α and β are computed for subsequent elimination of the encryption factors gr j of c j and k j
of d j , such that AS obtains only the result of dot product s (Equation (2)), but learns nothing
about (⃗x, ⃗y, ⃗r, ⃗k).
C sends an authentication request message (α, β, d⃗) to the AS for the authentication.
Upon receiving (α, β, d⃗) from C, AS retrieves encrypted reference template ⃗c and computes
m
dj
S = α ∏ c j − βn (3)
j =1
=1 + sn
S −1
Finally, the dot product s = L(S) = n = ∑m
j=1 xi yi is restored. AS checks s > τ. If this is
true, then AS accepts the request.
m
⃗ α, β). Since α = g− ∑ j=1 r j d j , β = ∑m x j k j , are aggregated
AS has knowledge of (⃗c, d, j =1
values, they do not reveal information about the elements of (⃗x, ⃗y,⃗r ).
PR2. The authentication server must not learn the probe vector ⃗y during the authentication phase.
In the authentication phase, C blinds each element of the probe vector ⃗y as d j = y j + k j ,
1 ≤ j ≤ m, with a secret random integer k j ∈ Z∗n . Due to the blinding, it is impossible to
⃗ However, k j , 1 ≤ j ≤ m, occur in the computation of the dot
determine y j or k j from d.
m
product β = ∑ j=1 x j k j mod n2 . Thus, no information about ⃗y from β could be learned.
PR3. The authentication server should only learn the outcome but nothing more.
The reference template vector and probe vector are blinded by the mean of random
secret elements (⃗r, ⃗k ), which are canceled out by means of α and β in a privacy-persevering
way. AS can only see the final result of the dot product, which is the cosine similarity
between the probe and the reference template.
x j = a j /A, 1 ≤ j ≤ m
Generate:
⃗r = (r1 , . . . , rm )
Compute:
c j = gr j (1 + x j n) mod n2
⃗c = (c1 , . . . , cm )
⃗c
−−−−−−−−−−−−−
→
Store ⃗c
Select: r ′j ∈ Z∗n
n
c′j = r ′j (1 + x j n) mod n2
⃗c′ = (c′ , . . . , c′m )
1
store: ⃗c′ , ⃗r
Authentication phase
Retrieve: ⃗c′ , ⃗r Retrieve ⃗c
⃗b = (b1 , . . . , bm )
q
B = ∑m j =1 b j
2
y j = b j /B, 1 ≤ j ≤ m
⃗y = (y1 , . . . , ym )
k j ∈ Z∗n
⃗k = (k1 , . . . , k m )
dj = yj + k j, 1 ≤ j ≤ m
d⃗ = (d1 , . . . , dm )
− m rd
α = g ∑ j=1 j j mod n2
γ = ∏m ′ k j mod n2 α, γ, d⃗
j =1 c j −−−−−−−−−−−−−→
γ′ = γλ mod n2
β = L(γ′ )
dj
s = α ∏m
j=1 c j − βn
mod n2
s>τ
Upon receiving the message from C, AS first decrypts γ in agreement with the Paillier
cryptosystem by first computing
m
∏ c′j
kj λ
γ′ =γλ = mod n2
j =1
m
= ∏ r ′j
k j λn
(1 + x j n ) k j λ mod n2
j =1
m
(5)
= ∏ 1 + x j k j λn mod n 2
j =1
m
=1 + nλ ∑ x j k j mod n2
j =1
Cryptography 2024, 8, 3 10 of 14
k j λn
where r ′j ≡ 1 mod n2 , AS restores
m
β = L ( γ ′ ) · λ −1 mod n = ∑ xj k j
j =1
Number of Cryptographic
Protocol Number of Rounds
Encryptions Primitives
Safa et al. [10] 3 3m Paillier + OPE
Domingo-Ferrer et al. [11] 2 2m Paillier, PSI
Paillier Threshold
Baig et al. [25] 4 km + 4
Decryption + OT
Proposed protocol (s) 1 m+2 Modified Paillier
The protocol proposed by Govindarajan et al. [7] completes the authentication decision
by performing four round transmissions between the client and the server, whereas in the
first transmission, a vector of the m encrypted element is transmitted to the client. Then,
the client and the server invoke the privacy-preserving comparison protocol proposed
Cryptography 2024, 8, 3 11 of 14
by Damgård et al. [15,16] to compute the Scaled Manhattan Distance. Note that the
Damgård et al. [15,16] protocol compares integers in privacy-preserving manners without
compromising their confidentiality. They computed the Squared Euclidean distance based
on the Erkin et al. protocol [29]. Due to computational and communication inefficiencies of
the sub-protocol proposed by Damgård et al. [15,16], the Govindarajan et al. protocols [7,14]
are very inefficient.
The Wei et al. protocol [20] completes an authentication decision by making three
rounds of transmissions between the client and the server. In each interaction, m encrypted
elements are transmitted. Each party computes m scalar multiplication in each interaction.
The Baig et al. [25] protocols complete the authentication decision for k activities in four
rounds. Other means of continuous authentication, such as utilizing user physical location
data, cookies, IP addresses, etc., proposed in [10,11,30], are also very inefficient. Domingo-
Ferrer et al. [11] protocol takes two rounds, where each round sends an encryption of m
elements. Similarly, Shahandashti et al. [30] protocol also takes three rounds to complete
the authentication decision, and each round transmits m encryptions.
In comparison to the protocols in [7,20,23,25], our proposed protocols are very efficient
in terms of computation cost and communication costs.
Considering the scenario of continuous authentication, the authentication decision
is made periodically, such as instead of making the authentication decision based on a
single behavioral action, it should be decided on the basis of more than one action, such as
(k) actions; for such scenarios, the protocols in [7,20] take 4k, 3k interactions, respectively.
Meanwhile, for k actions, our protocols require only k round transmissions. The comparison
is presented in Table 2.
9. Performance Evaluation
To analyze the performance of the proposed protocols, we perform the biometric
analysis of the proposed protocols and determine the running time in milliseconds (ms).
Each user provides l samples in different sessions and on different devices. The
biometric performance is analyzed by determining the false match rate (FMR), false non-
match rate (FNMR), and equal error rate (EER). We randomly select one sample and make
it a reference template. For each user, a template is created by following the steps stated in
Cryptography 2024, 8, 3 12 of 14
the enrollment phase of proposed protocols; for example, we created 51 reference templates
(one for each user). The rest of the l − 1 samples are utilized for the testing. FNMR
determines the similarity between the reference template and the remaining samples.
For FMR, we construct (l) imposter samples by choosing different samples from
different users. FMR is determined by computing the similarity between the reference
template of each user and the imposter samples. The similarity is computed by following
steps mentioned in the proposed protocols.
The performance on the blinded features is the same as the performance of the baseline
in the plaintext domain. We achieved different performances on different thresholds (T).
The lower threshold gives lower FNMR but also gives high FMR. The highest FNMR of
0.462 has been achieved on T = 0.96, whereas the lowest FNMR has been 0.275 on T = 0.91.
The best FNMR 0.275 and FMR 0.282 are achieved on T = 0.91. Note that the accuracy of
the proposed protocols is the same as without privacy presented in Algorithm 1. Adding
cryptography does not degrade the accuracy.
(a) Protocol 1
(b) Protocol 2
Figure 3b shows the running time of the proposed protocol, protocol 2; due to the
decryption, protocol 2 has a slightly higher running time than protocol 1. This analysis
does not include the communication costs.
Author Contributions: Conceptualization, A.F.B. and S.E.; Methodology, A.F.B. and B.Y.; Validation,
A.F.B. and S.E.; Investigation, A.F.B., S.E. and B.Y.; Writing—original draft, A.F.B.; Writing—review &
editing, A.F.B.; Supervision, S.E. and B.Y. All authors have read and agreed to the published version
of the manuscript.
Funding: This work is part of the Privacy Matters (PriMa) project. The PriMa project has received
funding from European Union’s Horizon 2020 research and innovation programme under the Marie
Skłodowska-Curie grant agreement No. 860315.
Data Availability Statement: The data presented in this study are available in article.
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Baig, A.F.; Eskeland, S. Security, Privacy, and Usability in Continuous Authentication: A Survey. Sensors 2021, 21, 5967. [CrossRef]
[PubMed]
2. Atanassov, N.; Chowdhury, M.M. Mobile device threat: Malware. In Proceedings of the 2021 IEEE International Conference on
Electro Information Technology (EIT), Mt. Pleasant, MI, USA, 14–15 May 2021; pp. 7–13.
3. Weichbroth, P.; Łysik, Ł. Mobile security: Threats and best practices. Mob. Inf. Syst. 2020, 2020, 8828078. [CrossRef]
4. Antal, M.; Bokor, Z.; Szabó, L.Z. Information revealed from scrolling interactions on mobile devices. Pattern Recognit. Lett. 2015,
56, 7–13. [CrossRef]
5. GDPR. Processing of Special Categories of Personal Data. 2021. Available online: https://gdpr-info.eu/art-9-gdpr/ (accessed
on 3 March 2023).
6. On the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data,
and Repealing Directive 95/46/EC (General Data Protection Regulation). 2016. Available online: https://eur-lex.europa.eu/
legal-content/EN/TXT/?uri=CELEX%3A02016R0679-20160504 (accessed on 14 January 2024).
7. Govindarajan, S.; Gasti, P.; Balagani, K.S. Secure privacy-preserving protocols for outsourcing continuous authentication of
smartphone users with touch data. In Proceedings of the 2013 IEEE Sixth International Conference on Biometrics: Theory,
Applications and Systems (BTAS), Arlington, VA, USA, 29 September–2 October 2013; pp. 1–8.
8. Sitová, Z.; Šeděnka, J.; Yang, Q.; Peng, G.; Zhou, G.; Gasti, P.; Balagani, K.S. HMOG: New behavioral biometric features for
continuous authentication of smartphone users. IEEE Trans. Inf. Forensics Secur. 2015, 11, 877–892. [CrossRef]
9. Eskeland, S.; Baig, A.F. Cryptanalysis of a Privacy-preserving Behavior-oriented Authentication Scheme. In Proceedings
of the 19th International Conference on Security and Cryptography—SECRYPT 2022, Lisbon, Portugal, 11–13 July 2022;
pp. 299–304. [CrossRef]
10. Safa, N.A.; Safavi-Naini, R.; Shahandashti, S.F. Privacy-preserving implicit authentication. In Proceedings of the IFIP International
Information Security Conference, Marrakech, Morocco, 2–4 June 2014; pp. 471–484.
11. Domingo-Ferrer, J.; Wu, Q.; Blanco-Justicia, A. Flexible and robust privacy-preserving implicit authentication. In Proceedings of
the IFIP International Information Security and Privacy Conference, Hamburg, Germany, 26–28 May 2015; pp. 18–34.
12. Juels, A.; Wattenberg, M. A fuzzy commitment scheme. In Proceedings of the 6th ACM Conference on Computer and
Communications Security, Singapore, 1–4 November 1999; pp. 28–36.
Cryptography 2024, 8, 3 14 of 14
13. Bringer, J.; Chabanne, H.; Patey, A. Privacy-preserving biometric identification using secure multiparty computation: An
overview and recent trends. IEEE Signal Process. Mag. 2013, 30, 42–52. [CrossRef]
14. Balagani, K.S.; Gasti, P.; Elliott, A.; Richardson, A.; O’Neal, M. The impact of application context on privacy and performance of
keystroke authentication systems. J. Comput. Secur. 2018, 26, 543–556. [CrossRef]
15. Damgård, I.; Geisler, M.; Krøigaard, M. Efficient and secure comparison for on-line auctions. In Proceedings of the Australasian
Conference on Information Security and Privacy, Townsville, Australia, 2–4 July 2007; pp. 416–430.
16. Damgård, I.; Geisler, M.; Krøigard, M. A correction to ‘Efficient and secure comparison for on-line auctions’. Int. J. Appl. Cryptogr.
2009, 1, 323–324. [CrossRef]
17. Acar, A.; Liu, W.; Beyah, R.; Akkaya, K.; Uluagac, A.S. A privacy-preserving multifactor authentication system. Secur. Priv. 2019,
2, e88.
18. Gentry, C. A Fully Homomorphic Encryption Scheme; Stanford University: Stanford, CA, USA, 2009.
19. Kornblum, J. Identifying almost identical files using context triggered piecewise hashing. Digit. Investig. 2006, 3, 91–97. [CrossRef]
20. Wei, F.; Vijayakumar, P.; Kumar, N.; Zhang, R.; Cheng, Q. Privacy-Preserving Implicit Authentication Protocol Using Cosine
Similarity for Internet of Things. IEEE Internet Things J. 2020, 8, 5599–5606. [CrossRef]
21. Loya, J.; Bana, T. Privacy-Preserving Keystroke Analysis using Fully Homomorphic Encryption & Differential Privacy. In
Proceedings of the 2021 International Conference on Cyberworlds (CW), Caen, France, 28–30 September 2021; pp. 291–294.
22. Cheon, J.H.; Kim, A.; Kim, M.; Song, Y. Homomorphic encryption for arithmetic of approximate numbers. In Advances in
Cryptology–ASIACRYPT 2017, Proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and
Information Security, Hong Kong, China, 3–7 December 2017; Proceedings, Part I 23; Springer: Berlin/Heidelberg, Germany, 2017;
pp. 409–437.
23. Baig, A.F.; Eskeland, S. A Generic Privacy-Preserving Protocol For Keystroke Dynamics-Based Continuous Authentication. In
Proceedings of the 19th International Conference on Security and Cryptography—SECRYPT 2022, Lisbon, Portugal, 11–13 July
2022; pp. 491–498. [CrossRef]
24. Bours, P. Continuous keystroke dynamics: A different perspective towards biometric evaluation. Inf. Secur. Tech. Rep. 2012,
17, 36–43. [CrossRef]
25. Baig, A.F.; Eskeland, S.; Yang, B. Privacy-preserving continuous authentication using behavioral biometrics. Int. J. Inf. Secur. 2023,
22, 1833–1847. [CrossRef]
26. Paillier, P. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of the International
Conference on the Theory and Applications of Cryptographic Techniques, Prague, Czech Republic, 2–6 May 1999; pp. 223–238.
27. Damgård, I.; Jurik, M. A generalisation, a simplification and some applications of Paillier’s probabilistic public-key system. In
Public Key Cryptography, Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001,
Cheju Island, Republic of Korea, 13–15 February 2001; Proceedings 4; Springer: Berlin/Heidelberg, Germany, 2001; pp. 119–136.
28. Simoens, K.; Bringer, J.; Chabanne, H.; Seys, S. A framework for analyzing template security and privacy in biometric
authentication systems. IEEE Trans. Inf. Forensics Secur. 2012, 7, 833–841. [CrossRef]
29. Erkin, Z.; Franz, M.; Guajardo, J.; Katzenbeisser, S.; Lagendijk, I.; Toft, T. Privacy-preserving face recognition. In Proceedings of
the International Symposium on Privacy Enhancing Technologies Symposium, Seattle, WA, USA, 5–7 August 2009; pp. 235–253.
30. Shahandashti, S.F.; Safavi-Naini, R.; Safa, N.A. Reconciling user privacy and implicit authentication for mobile devices. Comput.
Secur. 2015, 53, 215–233. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.