Transcript Document
Privacy-Preserving
Biometric Authentication
Jonathan Hills
Adviser: Dr. Kakadiaris
Summer 2014
1
Overview
• Introduction
• Problem
• Security & Privacy
2
Why Biometrics?
• Passwords are hard to make secure
3
Challenges
Revocability
Template Protection
4
Biometric Cryptosystems (BCS)
Biometric Cryptosystems
Roberts, Chris. “Biometric Attack Vectors and Defences.” Computers & Security 26, no.
1 (2007): 14 – 25. doi:http://dx.doi.org/10.1016/j.cose.2006.12.008.
5
One Method: SMC
• Secure Multiparty Computation
– Neither party learns too much
– Provable strong security
– Outsourceable
6
Outsourceable PPBA
Chun, Hu, Yousef Elmehdwi, Feng Li, Prabir Bhattacharya, and Wei Jiang. “Outsourceable Two-Party PrivacyPreserving Biometric Authentication.” In Proceedings of the 9th ACM Symposium on Information, Computer
and Communications Security, 401–12. ASIA CCS ’14. New York, NY, USA: ACM, 2014.
doi:10.1145/2590296.2590343.
7