Homomorphic Encryption for Secure Biometrics


BIWG: Research & Prototyping


Vishnu Boddeti

Michigan State University

Slides: hal.cse.msu.edu/talks
VishnuBoddeti

Progress In Biometric Recognition

Face Recognition
Fingerprint Recognition
Iris Recognition
Gait Recognition



Key Driver
Data, Compute, Algorithms

Widespread deployment in the real-world.

Biometric recognition tasks





Verification (1:1 comparison) and Search (1:N comparison)

Biometric System Vulnerabilities

Privacy and Security for biometric recognition

Privacy and security are often conflated with each other despite their differences...
Assuming access, what sensitive information can be learned? How to gain access to sensitive assets?
There is no privacy without security

What are the privacy and security risks in Biometric Systems?


From Template inversion attack to Replay and Presentation attack

Template inversion attack on High resolution image



High resolution image reconstruction [SM23]

Template inversion attack enables Presentation attack



[SM23] Comprehensive vulnerability evaluation of face recognition systems to template inversion attacks via 3D face reconstruction

Presentation attack via digital replay and printed photograph

Presentation attack via printed photograph

Attack Success on ArcFace Model

Mitigating Security Vulnerabilities

Biometrics + Encryption

Biometric template protection schemes


Encrypted Biometrics

  • Traditional solutions need data decryption for computation.
  • Security only during data transmission.

Homomorphic Encryption: The Holy Grail?

  • Cryptographic scheme needs to allow computations directly on the encrypted data.
    • Solution: Homomorphic Encryption
    • Attractive Property: Conjectured to be post-quantum secure for appropriate choice of encryption parameters.

FHE for Biometric Verification

Biometric Verification with HE

  • Vishnu Naresh Boddeti, "Secure Face Matching Using Fully Homomorphic Encryption," BTAS 2018

Key Ideas for Biometric Verification in FHE

  • Key Ideas:
    • SIMD data encoding for efficiency
    • Inner product computation over FHE
    • Provable privacy and security
    • No loss in verification accuracy

FHE for Biometric Search

Overview

Key Ideas for Scalable Biometric Search in FHE



Synergistic Combination of ML and FHE


  • Dimensionality Reduction (Machine Learning)


  • Scalable Data Encoding (FHE)

Scalable Data Encoding

Efficient Search with Dimensionality Reduction

    • Build upon DeepMDS for dimensionality reduction.

Effect of the dimensionality reduction on search runtime

Effect of the dimensionality reduction on search Accuracy (Rank-1)

[EJB22] HERS: Homomorphically Encrypted Representation Search

Two-Stage Search



    1. Use compressed features (16D) to perform approximate search.
    2. Narrow down search to $K$, say 10000, nearest neighbors.
    3. Use original features (192D) to perform exact search over $K$.
    4. 9$\times$ speed-up (4500 sec to 500 sec) without loss of accuracy.
[EJB22] HERS: Homomorphically Encrypted Representation Search

Protected Biometric Search Solutions in the Literature


Summary of FHE-based Search solutions



  • Computational complexity $\mathcal{O}\left( K \cdot \left( \#\mathrm{M}_{\mathrm{HE}} + \#\mathrm{R}_{\mathrm{HE}} + \#\mathrm{A}_{\mathrm{HE}} \right) \right)$


FHE for Biometric Template Fusion

Homomorphically Encrypted Fusion of Biometric Templates

  • [SRRB'22] HEFT: Homomorphically Encrypted Fusion of Biometric Templates, IJCB 2022 (Best Student Paper Award)

Fusion Improves Performance, Reduces Dimensionality

  • Fusion improves performance:
    • Face by 11.07%
    • Voice by 9.58%
  • Dimensionality Reduction:
    • $512D \rightarrow 32D$ (16$\times$ compression)
  • [SRRB'22] HEFT: Homomorphically Encrypted Fusion of Biometric Templates, IJCB 2022 (Best Student Paper Award)

Open Problems

Open Problem: End-to-end encrypted biometric recognition

Open Problem: Computation integrity check of biometrics under FHE

We trust BUT we do not verify
[BHV+21] Fast and accurate likelihood ratio-based biometric verification secure against malicious adversaries

Open Problem: Hardware Accelerators for FHE

[Source: Duality Technologies]

Open Problem: Distributed Biometric Authentication

Secure federated learning
Federated learning for face recognition

    • Aggarwal et al. "FedFace: Collaborative Learning of Face Recognition Model," IJCB 2021
    • Meng et al. "Improving Federated Learning Face Recognition via Privacy-Agnostic Clusters," ICLR 2022

    • Preliminary Work
      • Yonetani, Boddeti, Kitani, Sato "Privacy-Preserving Visual Learning Using Doubly Permuted Homomorphic Encryption," ICCV 2017

Summary

    • Homomorphic encryption offers the potential for end-to-end biometric security with strong post-quantum security guarantees.

    • Challenges: High computational complexity.
    • Progress: Template protection has been successfully demonstrated for large-scale biometric search.
    • Opportunities: Increase efficiency through custom neural network design and hardware accelerators.