June 30, 2022, 1:20 a.m. | Vamoua Yachongka, Hideki Yagi

cs.CR updates on arXiv.org arxiv.org

We propose a biometric identification system where the chosen- and
generated-secret keys are used simultaneously, and investigate its fundamental
limits from information-theoretic perspectives. The system consists of two
phases: enrollment and identification phases. In the enrollment phase, for each
user, the encoder uses a secret key, which is chosen independently, and the
biometric identifier to generate another secret key and a helper {data}. In the
identification phase, observing the biometric sequence of the identified user,
the decoder estimates index, chosen- …

biometric correlation identification keys secret systems

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Cyber Systems Administration

@ Peraton | Washington, DC, United States

Android Security Engineer, Public Sector

@ Google | Reston, VA, USA

Lead Electronic Security Engineer, CPP - Federal Facilities - Hybrid

@ Black & Veatch | Denver, CO, US

Profissional Sênior de Compliance & Validação em TI - Montes Claros (MG)

@ Novo Nordisk | Montes Claros, Minas Gerais, BR

Principal Engineer, Product Security Engineering

@ Google | Sunnyvale, CA, USA