proximately 1/60th of the time required for the MPyC
implementation. Based on this estimation, it is rec-
ommended to utilize MP-SPDZ for future implemen-
tations and optimizations.
4 CONCLUSIONS
In our work we present the preliminary evaluation
of two privacy preserving fingerprint matchers. The
first is FingerCode, a matcher based on feature vector
comparison. As expected the matcher was simple to
implement with MPC and achieved a fast execution
time of 45ms per 1:1 fingerprint comparison. How-
ever, the matcher showed poor accuracy results and is
thus not applicable for real-world deployment.
While researchers are actively exploring machine
learning-based FingerCode extraction and more ac-
curate results can be expected in the future, the ma-
jority of matchers currently favor minutiae-based ap-
proaches due to their superior accuracy. This is why
we focused mainly on the encryption of minutiae-
based fingerprint matchers in our research.
The second matcher we implemented was
SourceAFIS, a minutiae-based fingerprint matcher
with very good matching accuracy. Our prelimi-
nary evaluation estimated that we are not only able
to implement a working minutiae-based fingerprint
matcher with MPC but also improve the execution
time from 3 hours to 7 seconds.
In the future we plan optimizations regarding par-
allelization and exploitation of techniques to speedup
the MPC implementation. We are also working on a
full implementation in MP-SPDZ to fully leverage the
potential of our optimizations. Finally, we are study-
ing the leakage of our trade-off in detail as well as
additional measures to further reduce it, e.g., by edge
and vertex permutations.
ACKNOWLEDGEMENTS
The work was partially funded by the Austrian Se-
curity Research Programme KIRAS of the Federal
Ministry of Finance via grant agreement no. 905287
(”PASSENGER”) and from the European Union’s
Horizon Europe Programme via grant agreement no.
101073821 (”SUNRISE”). Views and opinions ex-
pressed are however those of the author(s) only and
do not necessarily reflect those of the European Union
or the European Research Executive Agency. Neither
the European Union nor the granting authority can be
held responsible for them.
REFERENCES
Adnan, S., Ali, F., and Abdulmunem, A. A. (2020). Fa-
cial feature extraction for face recognition. In Jour-
nal of Physics: Conference Series, volume 1664, page
012050. IOP Publishing.
Barni, M., Bianchi, T., Catalano, D., et al. (2010). Privacy-
preserving fingercode authentication. In Proceedings
of the 12th ACM workshop on Multimedia and secu-
rity, pages 231–240.
Blanton, M. and Gasti, P. (2011). Secure and efficient proto-
cols for iris and fingerprint identification. In Computer
Security–ESORICS 2011: 16th European Symposium
on Research in Computer Security, Leuven, Belgium,
September 12-14, 2011. Proceedings 16, pages 190–
209. Springer.
Eerikson, H. (2020). Privacy preserving fingerprint identi-
fication. Bachelor’s Thesis.
F
˘
al
˘
amas¸, D.-E., Marton, K., and Suciu, A. (2021). Assess-
ment of two privacy preserving authentication meth-
ods using secure multiparty computation based on se-
cret sharing. Symmetry, 13(5):894.
Jain, A., Prabhakar, S., Hong, L., and Pankanti, S. (1999).
Fingercode: a filterbank for fingerprint representation
and matching. In Proceedings. 1999 IEEE Computer
Society Conference on Computer Vision and Pattern
Recognition, volume 2, pages 187–193.
Keller, M. (2020). Mp-spdz: A versatile framework for
multi-party computation. In Proceedings of the 2020
ACM SIGSAC conference on computer and communi-
cations security, pages 1575–1590.
Lor
¨
unser, T. and Wohner, F. (2020). Performance compar-
ison of two generic mpc-frameworks with symmetric
ciphers. In ICETE (2), pages 587–594.
Lor
¨
unser, T., Wohner, F., and Krenn, S. (2022). A verifiable
multiparty computation solver for the linear assign-
ment problem: And applications to air traffic manage-
ment. In Proceedings of the 2022 on Cloud Comput-
ing Security Workshop, CCSW’22, page 41–51, New
York, NY, USA. Association for Computing Machin-
ery.
Maio, D., Maltoni, D., Cappelli, R., et al. (2002). Fvc2000:
Fingerprint verification competition. IEEE transac-
tions on pattern analysis and machine intelligence,
24(3):402–412.
Schoenmakers, B. (2018). Mpyc secure multiparty compu-
tation in python. Last accessed 01-07-2023.
Shahandashti, S. F., Safavi-Naini, R., and Ogunbona, P.
(2012). Private fingerprint matching. In Australasian
Conference on Information Security and Privacy,
pages 426–433. Springer.
Simoens, K., Tuyls, P., and Preneel, B. (2009). Privacy
weaknesses in biometric sketches. In 2009 30th IEEE
Symposium on Security and Privacy, pages 188–203.
Strobl, B. and Natali, M. (2022). Enhancing biometric data
security by design. ERCIM NEWS, 131:25–26.
Va
ˇ
zan, R. (2004). Sourceafis fingerprint matcher. Last ac-
cessed 09-11-2023.
ICISSP 2024 - 10th International Conference on Information Systems Security and Privacy
906