Paper 2010/627

Secure and Efficient Protocols for Iris and Fingerprint Identification

Marina Blanton and Paolo Gasti


Recent advances in biometric recognition and the increasing use of biometric data prompt significant privacy challenges associated with the possible misuse, loss or theft, of biometric data. Biometric matching is often performed by two mutually suspicious parties, one of which holds one biometric image while the other owns a possibly large biometric collection. Due to privacy and liability considerations, neither party is willing to share its data. This gives rise to the need to develop secure computation techniques over biometric data where no information is revealed to the parties except the outcome of the comparison or search. To address the problem, in this work we develop and implement the first privacy-preserving identification protocol for iris codes. We also design and implement a secure protocol for fingerprint identification based on FingerCodes with a substantial improvement in the performance compared to existing solutions. We show that new techniques and optimizations employed in this work allow us to achieve particularly efficient protocols suitable for large data sets and obtain notable performance gain compared to the state-of-the-art prior work.

Available format(s)
Cryptographic protocols
Publication info
Published elsewhere. Full version of paper that appears at ESORICS'11.
secure biometric computationtwo-party protocolsimplementation
Contact author(s)
mblanton @ nd edu
2011-09-17: last of 2 revisions
2010-12-13: received
See all versions
Short URL
Creative Commons Attribution


      author = {Marina Blanton and Paolo Gasti},
      title = {Secure and Efficient Protocols for Iris and Fingerprint Identification},
      howpublished = {Cryptology ePrint Archive, Paper 2010/627},
      year = {2010},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.