Fuzzy Extractors are Practical

435
12.1
Published on 28 Jan 2026, 18:20
Speaker: Amey Shukla, University of Connecticut
Host: Melissa Chase

Despite decades of effort, a chasm existed between the theory and practice of device-level biometric authentication. Deployed authentication algorithms rely on data that overtly leaks private information about the biometric; thus, systems rely on externalized security measures such as trusted execution environments. The authentication algorithms have no cryptographic guarantees. We close this chasm. We introduce a key derivation system with 105 bits of entropy and a 92% true accept rate for the iris.

See more at microsoft.com/en-us/research/v...
Random videos
70 days – 01:02:59
Vegas Test Stream!
145 days – 280 3091:52
Unboxing Galaxy XR | Samsung
06.08.23 – 147 2590:41
The First-Ever Website #shorts
19.07.22 – 1 703 96918:11
Am I wasting my money? - LTT Labs Update
06.04.22 – 134 2611:14
DDR5: Unlimit the limit l Samsung
autotechmusickids