Research Article

Minutiae Matching with Privacy Protection Based on the Combination of Garbled Circuit and Homomorphic Encryption

Algorithm 2

City-block-distance ( , ).
Input: the encrypted template
from Bob, and query minutiae from Alice
Output: Alice gets a blind list
between and .
(1)   Bob chooses , , concatenates them as strings:
   ,, ,
  where . For , …, ,
   he computes , where ,
  and so forth and , , . He sends these cipher texts to Alice.
(2)   Alice decrypts , …, and obtains and
  by parsing into , and bit chunks respectively.
  For , …, and , …, , she computes ,
  
  and .