Microsoft Research353 тыс
Предыдущее
Опубликовано 28 января 2026, 18:20
Speaker: Amey Shukla, University of Connecticut
Host: Melissa Chase
Despite decades of effort, a chasm existed between the theory and practice of device-level biometric authentication. Deployed authentication algorithms rely on data that overtly leaks private information about the biometric; thus, systems rely on externalized security measures such as trusted execution environments. The authentication algorithms have no cryptographic guarantees. We close this chasm. We introduce a key derivation system with 105 bits of entropy and a 92% true accept rate for the iris.
See more at microsoft.com/en-us/research/v...
Host: Melissa Chase
Despite decades of effort, a chasm existed between the theory and practice of device-level biometric authentication. Deployed authentication algorithms rely on data that overtly leaks private information about the biometric; thus, systems rely on externalized security measures such as trusted execution environments. The authentication algorithms have no cryptographic guarantees. We close this chasm. We introduce a key derivation system with 105 bits of entropy and a 92% true accept rate for the iris.
See more at microsoft.com/en-us/research/v...
Свежие видео
Случайные видео






















