Fuzzy Extractors are Practical

  • Melissa Chase, Microsoft; Amey Shukla, University of Connecticut

Despite decades of effort, a chasm existed between the theory and practice of device-level biometric authentication. Deployed authentication algorithms rely on data that overtly leaks private information about the biometric; thus, systems rely on externalized security measures such as trusted execution environments. The authentication algorithms have no cryptographic guarantees. We close this chasm. We introduce a key derivation system with 105 bits of entropy and a 92% true accept rate for the iris.

系列: Cryptography Talk Series