with a Private Information Retrieval (PIR) scheme. Their proposal is made to enforce the
privacy of biometric data of users. We improve their work in several aspects. Firstly, we show
how to replace the basic PIR scheme they used with Lipmaa's which has ones of the best
known communication complexity. Secondly, we combine it with Secure Sketches to enable
a strict separation between on one hand biometric data which remain the same all along a …