All sessions

Aadhaar & Al: The Identity Paradox

Contents

Executive Summary

This AI summit talk explores the intersection of artificial intelligence and identity verification through India's Aadhaar system (UIDAI), highlighting both the opportunities AI presents for strengthening identity platforms and the novel security challenges it introduces—particularly deepfakes and presentation attacks. The session reveals how foundational identity infrastructure must evolve with AI while maintaining inclusivity, privacy, and trust across 1.4 billion users.

Key Takeaways

  1. AI's dual role: AI is both the threat (industrialized deepfakes) and the defense (liveness detection, fraud engines). Identity platforms must stay "ahead of the race" through continuous innovation and ecosystem collaboration.

  2. Inclusion is non-negotiable: Scaling identity systems to 1.4+ billion people requires addressing cognitive load, language barriers, accessibility (e.g., for people with disabilities), and ensuring technology doesn't exclude the most vulnerable.

  3. Privacy and utility are solvable through technology: Data minimization and privacy guardrails aren't blockers—privacy-enhancing technologies (PETs), renewable biometrics, and cryptographic derivation can unlock responsible AI training while preserving citizen protection.

  4. Ecosystems beat silos: UIDAI's success depends on open-source collaboration (MOSIP), sandbox access for 20+ entities, hackathons, and funded research programs (SITHA). No single organization solves identity challenges; shared responsibility drives innovation.

  5. Post-quantum cryptography is urgent, not optional: Harvest-now-decrypt-later attacks mean current cryptographic identities (RSA, elliptic curve) are vulnerable within 10–20 years. Adopting NIST-standardized post-quantum algorithms (lattice-based cryptography) should begin immediately.

Key Topics Covered

  • Identity paradox: How AI simultaneously strengthens and threatens identity verification systems
  • Deception industrialization: The maturation of AI-driven fraud techniques (deepfakes, fake biometrics, synthetic voices)
  • Liveness detection: AI-powered detection of live biometrics vs. presentation attacks
  • Privacy-preserving technologies: Data minimization strategies and responsible use of biometric data
  • Inclusion challenges: Extending authentication to marginalized populations (e.g., accessible face authentication for those with disabilities)
  • Biometric fraud detection: Transition from classical algorithms to machine learning models for fingerprint, face, and iris matching
  • Voice authentication: Sovereign models for multilingual fraud detection and citizen engagement
  • Offline verification ecosystem: Decentralizing identity verification through the Aadhaar app and QR-based transactions
  • Document verification: AI-based OCR and document forgery detection at scale
  • Agentic AI and delegation of identity: Managing AI agents acting on behalf of citizens
  • Post-quantum cryptography: Future-proofing identity systems against quantum computing threats

Key Points & Insights

  1. Deception has been industrialized: AI deepfakes, fake voice, and synthetic biometrics represent a qualitative shift—deception technology has matured "well ahead of its time." The fundamental assumption "seeing is believing" is no longer reliable.

  2. Inclusivity remains foundational: Current biometric authentication (face, fingerprint, iris) excludes certain populations. The challenge is extending technology access while maintaining security—not a false choice between the two.

  3. Data-minimization paradox: UIDAI holds 1.4 billion biometric records but cannot freely use them to train AI models due to privacy guardrails. Privacy-enhancing technologies (e.g., renewable biometric references, differential privacy) are needed to leverage data responsibly.

  4. Temporal advantage in training: UIDAI's 15+ years of historical data—including biometric progression from age 5 to 30—provides unique validation across aging and demographic diversity unavailable to private vendors. This contextual knowledge is irreplaceable.

  5. Liveness detection success: Fingerprint liveness detection at scale (detecting spoofed biometrics at population level) is a proven success story. Face and iris liveness remain critical next-generation challenges as deepfakes become more sophisticated.

  6. Fraud is evolving geographically and behaviorally: Deepfake attacks started in Indonesia ~2 years ago and are now emerging in India. Emerging threats include intimate fraud (spouses/family coercing biometric submission) and increasingly sophisticated presentation attacks (e.g., body positioning inconsistencies in selfies).

  7. Trust requires continuous validation: Trust in identity platforms is not one-time; it must be reinforced as threats evolve. UIDAI partners with 40+ fraud-detection engines; no single solution prevents all attacks.

  8. Language and cognitive load are UX barriers: 99% of multilingual UIDAI users default to English despite available local languages. fMRI research shows cognitive load differences in processing audio vs. visual information—interface design must account for this.

  9. Biometrics are non-revocable: Unlike passwords, compromised fingerprints or faces cannot be changed. Privacy-enhancing technologies (e.g., renewable biometric templates, cryptographic derivation of keys from faces) are essential for future resilience.

  10. Delegation of identity (agents) requires PKI rethinking: As AI agents act on behalf of citizens, identity delegation chains must use certificate authority models and post-quantum cryptography. Current systems lack frameworks for secure agentic delegation.


Notable Quotes or Statements

  • "The deception technique has matured well ahead of its time." — Speaker on AI-driven fraud escalation

  • "If Aadhaar is shared, Aadhaar is not actually shared—only demographic information is shared." — CEO UIDAI, on the philosophical shift in how identity should work

  • "Aadhaar is a 12-digit number, not a card." — CEO UIDAI, addressing foundational misconceptions about identity verification

  • "In a defense situation, we don't start preparing once the attack happens... we should have all our systems ready to fire." — Kedar Kulkarni (Hyperverge), on proactive fraud prevention

  • "Every time a legitimate user is not recognized, it's like your mother not recognizing you. We call India 'Bharat Mata'—Mother India should always recognize her kids." — Closing remark, emphasizing friction reduction in identity verification

  • "Imagine we are a Mosart Vienna orchestra with 40 engines playing simultaneously to prevent fraud." — Kedar Kulkarni, on the complexity of multi-layered fraud detection

  • "Data minimization and privacy guardrails are not blockers; they are features." — Implicit theme from UIDAI leadership on responsible data governance


Speakers & Organizations Mentioned

Government & Public Sector

  • UIDAI (Unique Identification Authority of India) — The central government body managing Aadhaar
    • Srikrishnan Madhavan Nair — CEO, UIDAI (mentioned in closure)
    • Sabuji (Speaker 1) — Head of Technology/Operations, UIDAI
    • Sridar G (Speaker 2) — UX/Experience Design Lead, UIDAI
    • Zach (Speaker 3) — Innovation & Partnerships, UIDAI
    • Tanushi Bharma / Tanushi Deharma — Deputy Director General, Technology Development, UIDAI
    • G Mani / Professor Mani — Core biometrics and design principles architect, UIDAI (15+ years)

Private Sector & Startups

  • Hyperverge — Biometric fraud detection and presentation attack detection (Kedar Kulkarni, Co-founder & CEO)
  • Seven Sense — Privacy-enhancing technologies, cryptography + biometrics (Varun Chataji, Co-founder & CTO)
  • MOSIP — Open-source identity platform (collaborative partner)
  • Grab — Southeast Asian logistics/fintech (deepfake fraud case study)
  • HDFC Bank — Voice authentication demonstration partner
  • Indian AI startups in voice/language models (unnamed, 3+ new sovereign models mentioned on Sept 18)

International & Policy

  • Daniel Abadi — Head of Technology & Partnerships, Center for Digital Public Infrastructure; former Under Secretary of Digital Government, Argentina (Moderator)
  • NIST (National Institute of Standards and Technology, USA) — Post-quantum cryptography standards
  • IETF (Internet Engineering Task Force) — Standards development for post-quantum certificates
  • ANRF (Anusandhan National Research Foundation) — Recently partnered with UIDAI on AI research

Countries/Delegations Referenced

  • Kenya (MOSIP delegation present)
  • Bolivia, Indonesia, Southeast Asia (technology adoption & fraud trend patterns)
  • Global South & developed nations (DPI leadership by India)

Technical Concepts & Resources

Biometric Technologies

  • Liveness detection: Fingerprint liveness, face liveness, iris liveness — detecting spoofed/synthetic biometrics
  • Presentation attack detection (PAD): Defense against deepfakes, masks, videos, and photo-based attacks
  • Biometric deduplication: Matching against gallery of 1.4 billion+ records; transition from classical algorithms to ML-based matching
  • Contactless biometrics: Emerging capability to authenticate via mobile phone (without touch-based sensors)
  • Multimodal biometrics: Face + fingerprint + iris bundled as single packet (non-separable for security)

Privacy & Cryptography

  • Privacy-Enhancing Technologies (PETs):
    • Renewable biometric references (non-revocable biometrics made revocable)
    • Differential privacy
    • Cryptographic derivation of keys from biometrics
  • Post-Quantum Cryptography Standards:
    • Module-Lattice-based Key Encapsulation Mechanism (ML-KEM)
    • Module-Lattice-based Digital Signature Algorithm (ML-DSA)
    • Shor's algorithm vulnerability in RSA & elliptic curve cryptography
  • Public Key Infrastructure (PKI): Certificate authority models for delegation chains
  • Verifiable Credentials: Digitally signed identity attributes (e.g., in Aadhaar app)

AI Models & Systems

  • Sovereign AI models (Indian): Early-stage multilingual voice models for fraud detection & citizen engagement
  • Large Language Models: Mentioned in context of energy consumption and pre-training bias (99% English, particularly American English)
  • Machine Learning models: Replacing classical biometric matching algorithms; advantages in accuracy but require bias mitigation
  • OCR (Optical Character Recognition): Document verification at scale, handling diverse languages (English + local Indian languages)
  • Agentic AI: AI agents acting on behalf of citizens (team of agents, software development in 2 hours vs. 4-6 months)

Data & Datasets

  • UIDAI anonymized datasets: Available on data.gov.in portal for research
  • Sandbox for testing: sandbox.uida.gov.in — access to APIs, 20+ entities currently testing
  • ~2 crore anonymized biometric data: Available for model testing without data exfiltration (bring model to data, not data to model)
  • Temporal data advantage: 15+ years of biometric progression (age 5 to 30+) unique to UIDAI

Programs & Initiatives

  • SITHA (Scheme for Innovation and Technology Association with Aadhaar): Funded pilot program for startups and academia
  • OVSC (Offline Verification Seeking Entities): Ecosystem enabling offline verification via Aadhaar app (QR-based like UPI)
  • Aadhaar App: Updated platform enabling verifiable credentials, paperless offline verification
  • Hackathons & Ideathons: Community-driven innovation with reward programs
  • Open Innovation Model: Core work by UIDAI; augmented work distributed across ecosystem

Standards & References

  • Aadhaar Act: Legal framework limiting biometric use to two purposes (enrollment & verification)
  • DPDPA (Data Protection and Personal Data Act, India): Privacy legislation governing biometric handling
  • GDPR, PDPA (Singapore/Indonesia/Malaysia): Comparative privacy frameworks referenced
  • ISO/IEC standards (implicit): Biometric template standards, liveness detection standards

Challenges Flagged

  • Harvest-now-decrypt-later: State actors capturing encrypted data for future decryption with quantum computers
  • Deepfakes: Sophistication increasing (e.g., body positioning inconsistencies harder to detect)
  • Intimate fraud: Family members coercing biometric submission without consent
  • Cognitive load in multilingual interfaces: Users default to English despite available local languages
  • Bias in biometric models: Quality thresholds set for one geography failing in others; requires ongoing calibration

Technical Depth & Methodological Insights

Temporal Validation Approach: UIDAI's unique advantage is validating face matching over 15+ years of aging within the same population. This enables testing accuracy across lifecycles unavailable to private vendors with static datasets.

Multi-Engine Fraud Detection: ~40 engines operating in parallel (not serial), each addressing specific attack vectors (deepfakes, presentation attacks, document forgery, etc.). Efficacy increases with full orchestration but scales with cost.

Privacy-by-Design vs. Privacy-Preserving: UIDAI practices data minimization (9 fields total; 3 biometric + 4 demographic + 2 optional). Privacy-enhancing technologies enable leveraging this data for AI training without direct biometric exposure.

Delegation of Identity via PKI: Proposed solution for agentic AI uses certificate authority chains (similar to SSL/TLS) where root certificate (Aadhaar) issues identity certificates, which issue sub-certificates for agents, all verifiable through cryptography.


This summary preserves the technical accuracy, policy implications, and operational insights from the full transcript while remaining accessible to stakeholders across government, industry, and academic domains.