{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T05:14:11Z","timestamp":1763788451827,"version":"3.45.0"},"reference-count":67,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T00:00:00Z","timestamp":1763510400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>As quantum computing continues to advance, it threatens the long-term protection of traditional cryptographic methods, especially in biometric authentication systems where it is important to protect sensitive data. To overcome this challenge, we present a comprehensive, privacy-preserving framework for multimodal biometric authentication that can easily integrate any two binary-encoded modalities through feature-level fusion, ensuring that all sensitive information remains encrypted under a CKKS-based homomorphic encryption scheme resistant to both classical and quantum-enabled attacks. To demonstrate its versatility and effectiveness, we apply this framework to the retinal vascular patterns and palm vein features, which are inherently spoof-resistant and particularly well suited to high-security applications. This method not only ensures the secrecy of the combined biometric sample, but also enables the complete assessment of recognition performance and resilience against adversarial attacks. The results show that our approach provides protection against threats such as data leakage and replay attacks while maintaining high recognition performance and operational efficiency. These findings demonstrate the feasibility of integrating multimodal biometrics with post-quantum cryptography, giving a strong, privacy-oriented authentication solution suitable for mission-critical applications in the post-quantum era.<\/jats:p>","DOI":"10.3390\/cryptography9040072","type":"journal-article","created":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T15:03:15Z","timestamp":1763564595000},"page":"72","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Post-Quantum Cryptography Enabled Feature-Level Fusion Framework for Privacy-Preserving Multimodal Biometric Recognition"],"prefix":"10.3390","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7821-5931","authenticated-orcid":false,"given":"David","family":"Palma","sequence":"first","affiliation":[{"name":"Polytechnic Department of Engineering and Architecture, University of Udine, 33100 Udine, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2536-0603","authenticated-orcid":false,"given":"Pier Luca","family":"Montessoro","sequence":"additional","affiliation":[{"name":"Polytechnic Department of Engineering and Architecture, University of Udine, 33100 Udine, Italy"}]}],"member":"1968","published-online":{"date-parts":[[2025,11,19]]},"reference":[{"key":"ref_1","unstructured":"Shor, P.W. (1994, January 20\u201322). Algorithms for quantum computation: Discrete logarithms and factoring. Proceedings of the 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Grover, L.K. (1996, January 22\u201324). A fast quantum mechanical algorithm for database search. Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing (STOC), Philadelphia, PA, USA.","DOI":"10.1145\/237814.237866"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Alagic, G., Bros, M., Ciadoux, P., Cooper, D., Dang, Q., Dang, T., Kelsey, J., Lichtinger, J., Liu, Y.K., and Miller, C. (2025). Status Report on the Fourth Round of the NIST Post-Quantum Cryptography Standardization Process.","DOI":"10.6028\/NIST.IR.8545"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Yang, W., Wang, S., Cui, H., Tang, Z., and Li, Y. (2023). A review of homomorphic encryption for privacy-preserving biometrics. Sensors, 23.","DOI":"10.3390\/s23073566"},{"key":"ref_5","unstructured":"Ross, A., and Jain, A.K. (2004, January 6\u201310). Multimodal biometrics: An overview. Proceedings of the 12th European Signal Processing Conference, Vienna, Austria."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2270","DOI":"10.1016\/j.patcog.2005.01.012","article-title":"Score normalization in multimodal biometric systems","volume":"38","author":"Jain","year":"2005","journal-title":"Pattern Recognit."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1867","DOI":"10.1007\/s12652-021-02952-0","article-title":"A feature-level fusion based improved multimodal biometric recognition system using ear and profile face","volume":"13","author":"Sarangi","year":"2022","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"9248","DOI":"10.3390\/s130709248","article-title":"Retinal identification based on an improved circular gabor filter and scale invariant feature transform","volume":"13","author":"Meng","year":"2013","journal-title":"Sensors"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Palma, D., and Montessoro, P.L. (2022). Biometric-based human recognition systems: An overview. Recent Advances in Biometrics, IntechOpen. Chapter 2.","DOI":"10.5772\/intechopen.101686"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1016\/j.compeleceng.2016.03.010","article-title":"Person identification using vascular and non-vascular retinal features","volume":"53","author":"Waheed","year":"2016","journal-title":"Comput. Electr. Eng."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"84168","DOI":"10.1109\/ACCESS.2023.3265583","article-title":"Homomorphic encryption on GPU","volume":"11","author":"Ayduman","year":"2023","journal-title":"IEEE Access"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1572","DOI":"10.1109\/JPROC.2022.3205665","article-title":"Survey on fully homomorphic encryption, theory, and applications","volume":"110","author":"Marcolla","year":"2022","journal-title":"Proc. IEEE"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Blanchini, F., Casagrande, D., Fabiani, F., Giordano, G., Palma, D., and Pesenti, R. (2021). A threshold mechanism ensures minimum-path flow in lightning discharge. Sci. Rep., 11.","DOI":"10.1038\/s41598-020-79463-z"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Palma, D., Montessoro, P.L., Giordano, G., and Blanchini, F. (2015, January 28\u201330). A dynamic algorithm for palmprint recognition. Proceedings of the IEEE International Conference on Communications and Network Security (CNS), Florence, Italy.","DOI":"10.1109\/CNS.2015.7346883"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"A. El_Rahman, S., and Alluhaidan, A.S. (2024). Enhanced multimodal biometric recognition systems based on deep learning and traditional methods in smart environments. PLoS ONE, 19.","DOI":"10.1371\/journal.pone.0291084"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1109\/TPAMI.2005.57","article-title":"Large-scale evaluation of multimodal biometric authentication using state-of-the-art systems","volume":"27","author":"Snelick","year":"2005","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_17","unstructured":"Delac, K., and Grgic, M. (2004, January 8\u201318). A survey of biometric recognition methods. Proceedings of the Proceedings. Elmar-2004. 46th International Symposium on Electronics in Marine, Zadar, Croatia."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Lenstra, A.K., and Lenstra, H.W. (1993). The Development of the Number Field Sieve, Springer Science & Business Media.","DOI":"10.1007\/BFb0091534"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Chen, L., Chen, L., Jordan, S., Liu, Y.K., Moody, D., Peralta, R., Perlner, R.A., and Smith-Tone, D. (2016). Report on Post-Quantum Cryptography.","DOI":"10.6028\/NIST.IR.8105"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1137\/S0036144598347011","article-title":"Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer","volume":"41","author":"Shor","year":"1999","journal-title":"SIAM Rev."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Brassard, G., H\u00f8yer, P., and Tapp, A. (1998, January 20\u201324). Quantum cryptanalysis of hash and claw-free functions. Proceedings of the LATIN\u201998: Theoretical Informatics: Third Latin American Symposium, Campinas, Brazil.","DOI":"10.1007\/BFb0054319"},{"key":"ref_22","unstructured":"Bringer, J., and Chabanne, H. (2008, January 11\u201314). An authentication protocol with encrypted biometric data. Proceedings of the International Conference on Cryptology in Africa, Casablanca, Morocco."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s10623-005-6343-z","article-title":"A fuzzy vault scheme","volume":"38","author":"Juels","year":"2006","journal-title":"Des. Codes Cryptogr."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"102144","DOI":"10.1016\/j.inffus.2023.102144","article-title":"Biometric template attacks and recent protection mechanisms: A survey","volume":"103","author":"Abdullahi","year":"2024","journal-title":"Inf. Fusion"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Cheon, J.H., Kim, A., Kim, M., and Song, Y. (2017, January 3\u20137). Homomorphic encryption for arithmetic of approximate numbers. Proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT), Hong Kong, China.","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref_26","unstructured":"Albrecht, M., Chase, M., Chen, H., Ding, J., Goldwasser, S., Gorbunov, S., Halevi, S., Hoffstein, J., Laine, K., and Lauter, K. (2025, February 01). Homomorphic Encryption Standard. Cryptology ePrint Archive, Paper 2019\/939. Available online: https:\/\/eprint.iacr.org\/2019\/939."},{"key":"ref_27","unstructured":"Albrecht, M., Player, R., and Scott, S. (2025, February 01). On the Concrete Hardness of Learning with Errors. Cryptology ePrint Archive, Paper 2015\/046. Available online: https:\/\/eprint.iacr.org\/2015\/046."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"183688","DOI":"10.1109\/ACCESS.2024.3512003","article-title":"For Your Eyes Only: A Privacy-Preserving Authentication Framework based on Homomorphic Encryption and Retina Biometrics","volume":"12","author":"Palma","year":"2024","journal-title":"IEEE Access"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Hoffstein, J., Pipher, J., and Silverman, J.H. (1998, January 21\u201325). NTRU: A ring-based public key cryptosystem. Proceedings of the International Algorithmic Number Theory Symposium, Portland, OR, USA.","DOI":"10.1007\/BFb0054868"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Gentry, C., Peikert, C., and Vaikuntanathan, V. (2008, January 17\u201320). Trapdoors for hard lattices and new cryptographic constructions. Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing (STOC), Victoria, BC, Canada.","DOI":"10.1145\/1374376.1374407"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1137\/120868669","article-title":"Efficient fully homomorphic encryption from (standard) LWE","volume":"43","author":"Brakerski","year":"2014","journal-title":"SIAM J. Comput."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Gentry, C. (2009). A Fully Homomorphic Encryption Scheme. [Ph.D. Thesis, Stanford University].","DOI":"10.1145\/1536414.1536440"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Hoeffding, W. (1994). Probability inequalities for sums of bounded random variables. The Collected Works of Wassily Hoeffding, Springer.","DOI":"10.1007\/978-1-4612-0865-5_26"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Liu, H., Wang, R., Shan, S., and Chen, X. (2016, January 27\u201330). Deep supervised hashing for fast image retrieval. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.227"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Lin, K., Lu, J., Chen, C.S., and Zhou, J. (2016, January 27\u201330). Learning compact binary descriptors with unsupervised deep neural networks. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.133"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.inffus.2017.10.003","article-title":"Multi-biometric template protection based on bloom filters","volume":"42","author":"Rathgeb","year":"2018","journal-title":"Inf. Fusion"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"100913","DOI":"10.1016\/j.arcontrol.2023.100913","article-title":"A brief survey on encrypted control: From the first to the second generation and beyond","volume":"56","author":"Binfet","year":"2023","journal-title":"Annu. Rev. Control"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Albrecht, M., Chase, M., Chen, H., Ding, J., Goldwasser, S., Gorbunov, S., Halevi, S., Hoffstein, J., Laine, K., and Lauter, K. (2021). Homomorphic encryption standard. Protecting Privacy Through Homomorphic Encryption, Springer.","DOI":"10.1007\/978-3-030-77287-1_2"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"2400507","DOI":"10.1002\/aisy.202400507","article-title":"A Privacy-Preserving System for Confidential Carpooling Services Using Homomorphic Encryption","volume":"7","author":"Palma","year":"2025","journal-title":"Adv. Intell. Syst."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Ammour, N., Bazi, Y., and Alajlan, N. (2023). Multimodal approach for enhancing biometric authentication. J. Imaging, 9.","DOI":"10.3390\/jimaging9090168"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"1971","DOI":"10.1016\/j.eswa.2012.10.002","article-title":"Investigating fusion approaches in multi-biometric cancellable recognition","volume":"40","author":"Canuto","year":"2013","journal-title":"Expert Syst. Appl."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1109\/TIFS.2011.2166545","article-title":"Multibiometric cryptosystems based on feature-level fusion","volume":"7","author":"Nagar","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Nandakumar, K., and Jain, A.K. (October, January 29). Multibiometric template security using fuzzy vault. Proceedings of the 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems, Washington, DC, USA.","DOI":"10.1109\/BTAS.2008.4699352"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Sutcu, Y., Li, Q., and Memon, N. (2007, January 17\u201322). Secure biometric templates from fingerprint-face features. Proceedings of the 2007 IEEE Conference on Computer Vision and Pattern Recognition, Minneapolis, MN, USA.","DOI":"10.1109\/CVPR.2007.383385"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Palma, D., Blanchini, F., and Montessoro, P.L. (2022). A system-theoretic approach for image-based infectious plant disease severity estimation. PLoS ONE, 17.","DOI":"10.1371\/journal.pone.0272002"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"106433","DOI":"10.1016\/j.dib.2020.106433","article-title":"RIDB: A dataset of fundus images for retina based person identification","volume":"33","author":"Akram","year":"2020","journal-title":"Data Brief"},{"key":"ref_47","unstructured":"Chinese Academy of Sciences Institute of Automation (2025, February 01). CASIA Multi-Spectral Palmprint Image Database V1.0. Available online: http:\/\/english.ia.cas.cn\/db\/201611\/t20161101_169937.html."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"118978","DOI":"10.1109\/ACCESS.2020.3005460","article-title":"A dynamic biometric authentication algorithm for near-infrared palm vascular patterns","volume":"8","author":"Palma","year":"2020","journal-title":"IEEE Access"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"2676","DOI":"10.1109\/TSMC.2017.2771232","article-title":"Biometric palmprint verification: A dynamical system approach","volume":"49","author":"Palma","year":"2019","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"ref_50","unstructured":"(2025, February 01). Microsoft SEAL (Release 4.1). Microsoft Research, Redmond, WA, 2023. Available online: https:\/\/github.com\/Microsoft\/SEAL."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Ibarrondo, A., and Viand, A. (2021, January 15). Pyfhel: Python for homomorphic encryption libraries. Proceedings of the 9th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, Seoul, Republic of Korea.","DOI":"10.1145\/3474366.3486923"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Fatima, J., Syed, A.M., and Akram, M.U. (2013, January 22\u201325). A secure personal identification system based on human retina. Proceedings of the 2013 IEEE Symposium on Industrial Electronics & Applications, Kuching, Malaysia.","DOI":"10.1109\/ISIEA.2013.6738974"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Waheed, Z., Waheed, A., and Akram, M.U. (2016, January 12\u201316). A robust non-vascular retina recognition system using structural features of retinal image. Proceedings of the 2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST), Islamabad, Pakistan.","DOI":"10.1109\/IBCAST.2016.7429862"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Mirmohamadsadeghi, L., and Drygajlo, A. (2011, January 11\u201313). Palm vein recognition with local binary patterns and local derivative patterns. Proceedings of the 2011 International Joint Conference on Biometrics (IJCB), Washington, DC, USA.","DOI":"10.1109\/IJCB.2011.6117804"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1109\/TIFS.2011.2158423","article-title":"Human identification using palm-vein images","volume":"6","author":"Zhou","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"1974","DOI":"10.1109\/TIFS.2014.2361020","article-title":"Contactless palm vein recognition using a mutual foreground-based local binary pattern","volume":"9","author":"Kang","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1049\/iet-bmt.2016.0085","article-title":"Palm vein recognition scheme based on an adaptive Gabor filter","volume":"6","author":"Ma","year":"2017","journal-title":"IET Biom."},{"key":"ref_58","unstructured":"Fan, J., and Vercauteren, F. (2025, February 01). Somewhat Practical Fully Homomorphic Encryption. Cryptology ePrint Archive. Available online: https:\/\/eprint.iacr.org\/2012\/144."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2633600","article-title":"(Leveled) fully homomorphic encryption without bootstrapping","volume":"6","author":"Brakerski","year":"2014","journal-title":"ACM Trans. Comput. Theory (TOCT)"},{"key":"ref_60","unstructured":"Costan, V., and Devadas, S. (2025, February 01). Intel SGX Explained. Cryptology ePrint Archive. Available online: https:\/\/eprint.iacr.org\/2016\/086."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Mohassel, P., and Zhang, Y. (2017, January 22\u201326). SecureML: A system for scalable privacy-preserving machine learning. Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA.","DOI":"10.1109\/SP.2017.12"},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Yao, A.C. (1982, January 3\u20135). Protocols for secure computations. Proceedings of the 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), Chicago, IL, USA.","DOI":"10.1109\/SFCS.1982.38"},{"key":"ref_63","unstructured":"Schnorr, C.P. (March, January 27). Lattice reduction by random sampling and birthday methods. Proceedings of the Annual Symposium on Theoretical Aspects of Computer Science, Berlin, Germany."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Chen, Y., and Nguyen, P.Q. (2011, January 4\u20138). BKZ 2.0: Better lattice security estimates. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Seoul, Republic of Korea.","DOI":"10.1007\/978-3-642-25385-0_1"},{"key":"ref_65","unstructured":"Liu, M., and Nguyen, P.Q. (\u20131, January 25). Solving BDD by enumeration: An update. Proceedings of the Cryptographers\u2019 Track at the RSA Conference, San Francisco, CA, USA."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Micciancio, D., and Regev, O. (2009). Lattice-based Cryptography. Post-Quantum Cryptography, Springer.","DOI":"10.1007\/978-3-540-88702-7_5"},{"key":"ref_67","unstructured":"Albrecht, M.R. (May, January 30). On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France."}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/9\/4\/72\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T05:11:46Z","timestamp":1763788306000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/9\/4\/72"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":67,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["cryptography9040072"],"URL":"https:\/\/doi.org\/10.3390\/cryptography9040072","relation":{},"ISSN":["2410-387X"],"issn-type":[{"type":"electronic","value":"2410-387X"}],"subject":[],"published":{"date-parts":[[2025,11,19]]}}}