Transcript Document
Privacy-Preserving Biometric Authentication Jonathan Hills Adviser: Dr. Kakadiaris Summer 2014 1 Overview • Introduction • Problem • Security & Privacy 2 Why Biometrics? • Passwords are hard to make secure 3 Challenges Revocability Template Protection 4 Biometric Cryptosystems (BCS) Biometric Cryptosystems Roberts, Chris. “Biometric Attack Vectors and Defences.” Computers & Security 26, no. 1 (2007): 14 – 25. doi:http://dx.doi.org/10.1016/j.cose.2006.12.008. 5 One Method: SMC • Secure Multiparty Computation – Neither party learns too much – Provable strong security – Outsourceable 6 Outsourceable PPBA Chun, Hu, Yousef Elmehdwi, Feng Li, Prabir Bhattacharya, and Wei Jiang. “Outsourceable Two-Party PrivacyPreserving Biometric Authentication.” In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 401–12. ASIA CCS ’14. New York, NY, USA: ACM, 2014. doi:10.1145/2590296.2590343. 7