Jan. 26, 2024, 8:48 a.m. |

IACR News www.iacr.org

ePrint Report: FiveEyes: Cryptographic Biometric Authentication from the Iris

Luke Demarest, Sohaib Ahmad, Sixia Chen, Benjamin Fuller, Alexander Russell


Despite decades of effort, a stubborn chasm exists between the theory and practice of device-level biometric authentication. Deployed authentication algorithms rely on data that leaks private information about the biometric; thus systems rely on externalized security measures such as trusted execution environments. In particular, the authentication algorithms themselves provide no cryptographic security guarantees.


This is particularly frustrating given the long line …

algorithms authentication biometric chen cryptographic data device eprint report information iris leaks practice private report systems theory

Financial Crimes Compliance - Senior - Consulting - Location Open

@ EY | New York City, US, 10001-8604

Software Engineer - Cloud Security

@ Neo4j | Malmö

Security Consultant

@ LRQA | Singapore, Singapore, SG, 119963

Identity Governance Consultant

@ Allianz | Sydney, NSW, AU, 2000

Educator, Cybersecurity

@ Brain Station | Toronto

Principal Security Engineer

@ Hippocratic AI | Palo Alto