Paper 2024/100

FiveEyes: Cryptographic Biometric Authentication from the Iris

Luke Demarest, Gonzaga University
Sohaib Ahmad, University of Connecticut
Sixia Chen, Adelphi University
Benjamin Fuller, University of Connecticut
Alexander Russell, University of Connecticut
Abstract

Despite decades of effort, a stubborn chasm exists between the theory and practice of device-level biometric authentication. Deployed authentication algorithms rely on data that overtly leaks private information about the biometric; thus systems rely on externalized security measures such as trusted execution environments. The authentication algorithms have no cryptographic guarantees. This is particularly frustrating given the long line of research that has developed theoretical tools—known as fuzzy extractors—that enable secure, privacy preserving biometric authentication with public enrollment data (Dodis et al., SIAM Journal of Computing 2008). Unfortunately, the best known constructions either: 1. Assume that bits of biometrics are i.i.d. (or that all correlation is captured in pairs of features (Hine et al., TIFS 2023)), which is not true for the biometrics themselves or for features extracted using modern learning techniques, or 2. Only provide substantial true accept rates with an estimated security of $32$ bits for the iris (Simhadri et al., ISC 2019) and $45$ bits for the face (Zhang, Cui, and Yu, ePrint 2021/1559). This work introduces FiveEyes, an iris key derivation system powered by technical advances in both 1) feature extraction from the iris and 2) the fuzzy extractor used to secure authentication keys. FiveEyes’ feature extractor’s loss focuses on quality for key derivation. The fuzzy extractor builds on sample-then-lock (Canetti et al., Journal of Cryptology 2021). FiveEyes’ fuzzy extractor uses statistics of the produced features to sample non-uniformly, which significantly improves the security vs. true accept rate (TAR) tradeoff. Irises used to evaluate TAR and security are class disjoint from those used for training and collecting statistics. We state assumptions sufficient for security. We present various parameter regimes to highlight different TARs: 1. $65$ bits of security (equivalent to $87$ bits with a password) at $12$% TAR, and 2. $50$ bits of security (equivalent to $72$ bits with a password) at $45$% TAR. Applying known TAR (Davida et al., IEEE S&P 1998) amplification techniques additively boosts TAR by $30$% for the above settings.

Note: Substantial editorial work and more discussion of prior work.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Preprint.
Keywords
biometricsfuzzy extractorsirisfeature extractors
Contact author(s)
onlylukejohnson @ gmail com
sohaib ahmad @ uconn edu
chensixia09 @ gmail com
benjamin fuller @ uconn edu
acr @ uconn edu
History
2024-04-30: revised
2024-01-22: received
See all versions
Short URL
https://ia.cr/2024/100
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/100,
      author = {Luke Demarest and Sohaib Ahmad and Sixia Chen and Benjamin Fuller and Alexander Russell},
      title = {FiveEyes: Cryptographic Biometric Authentication from the Iris},
      howpublished = {Cryptology ePrint Archive, Paper 2024/100},
      year = {2024},
      note = {\url{https://eprint.iacr.org/2024/100}},
      url = {https://eprint.iacr.org/2024/100}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.