STOCK TITAN

authID Launches Industry-First Quantum-Resistant Biometric Authentication Platform

Rhea-AI Impact
(Moderate)
Rhea-AI Sentiment
(Neutral)
Tags

authID (Nasdaq: AUID) launched a quantum-resistant upgrade to its PrivacyKey™ biometric digital signature platform on April 24, 2026. The platform uses a zero-storage, ephemeral-key design that regenerates and destroys private keys per authentication and supports three NIST-standardized post-quantum algorithms: ML-DSA-65, SLH-DSA-128s, SLH-DSA-256s.

PrivacyKey™ also uses AES-256 keys sharded via threshold MPC across independent nodes so no single node stores a whole key. The quantum-resistant platform is available now for enterprise customers.

Loading...
Loading translation...

Positive

  • Supports three NIST post-quantum algorithms: ML-DSA-65, SLH-DSA-128s, SLH-DSA-256s
  • Zero-storage, ephemeral-key biometric signatures that destroy private keys after each authentication
  • Threshold MPC key sharding with AES-256 keys split across independent nodes
  • Available now for enterprise customers seeking quantum-resistant identity infrastructure

Negative

  • None.

News Market Reaction – AUID

+2.48%
1 alert
+2.48% News Effect
+$472K Valuation Impact
$19.52M Market Cap
0.0x Rel. Volume

On the day this news was published, AUID gained 2.48%, reflecting a moderate positive market reaction. This price movement added approximately $472K to the company's valuation, bringing the market cap to $19.52M at that time.

Data tracked by StockTitan Argus on the day of publication.

Key Figures

False positive rate: 1-in-1-billion RSA encryption level: RSA-2048 AES key strength: AES-256
3 metrics
False positive rate 1-in-1-billion Biometric identity platform assurance level
RSA encryption level RSA-2048 Current strong encryption referenced as vulnerable to quantum
AES key strength AES-256 Key size protecting each PrivacyKeyMap artifact

Market Reality Check

Price: $1.3100 Vol: Volume 111,398 is below t...
low vol
$1.3100 Last Close
Volume Volume 111,398 is below the 20-day average of 211,343, suggesting muted trading interest ahead of this launch. low
Technical Shares at $1.21 are trading below the $2.25 200-day moving average and about 87% under the 52-week high of $9.58.

Peers on Argus

AUID fell 11.68% while momentum peers in related software/cyber names were mixed...
3 Up 2 Down

AUID fell 11.68% while momentum peers in related software/cyber names were mixed, with 3 up and 2 down. This divergence versus a mixed peer tape points to stock-specific factors rather than a clean sector-wide move.

Historical Context

5 past events · Latest: Apr 02 (Positive)
Pattern 5 events
Date Event Sentiment Move Catalyst
Apr 02 Strategic partnership Positive +5.3% Formula5 partnership to expand biometric security in Microsoft-first enterprises.
Mar 31 Earnings report Negative -12.3% FY 2025 results with higher revenue but wider losses and higher expenses.
Mar 25 OEM partnership Positive +0.0% OEM deal embedding authID biometrics into reusable identity credentials.
Mar 23 Earnings date notice Neutral -8.8% Announcement of date and call details for Q4 and FY 2025 results.
Mar 11 AI partnership Positive +10.1% Section 2 partnership tying biometric verification to financial crime detection.
Pattern Detected

Partnership announcements have often seen positive or flat reactions, while financial updates have drawn sharper negative moves.

Recent Company History

Over the last six weeks, AUID has issued multiple partnership and financial updates. On Mar 11 and Mar 25, strategic partnerships around biometric identity and AI-driven security produced price moves of +10.14% and 0%, respectively. The FY 2025 earnings release on Mar 31 showed higher revenue but wider losses and a -12.31% reaction. A further partnership on Apr 2 saw a +5.26% move. Today’s product-focused security announcement follows this mix of upbeat commercial news and financial strain.

Market Pulse Summary

This announcement introduces a quantum-resistant biometric platform that uses NIST-standard post-qua...
Analysis

This announcement introduces a quantum-resistant biometric platform that uses NIST-standard post-quantum algorithms and MPC-based key sharding, while avoiding biometric data at rest. It follows several recent partnerships and FY 2025 results showing higher revenue but wider losses and lower remaining performance obligation. Investors may monitor how quickly enterprises adopt this platform, revenue and ARR trends from these launches, and any further financing activity disclosed in future filings. The 1-in-1-billion false positive rate remains a key performance metric.

Key Terms

post-quantum, biometric digital signature, lattice-based cryptography, hash-based cryptography, +1 more
5 terms
post-quantum technical
"PrivacyKey Platform Integrates NIST Post-Quantum Standards and MPC..."
Post-quantum describes technology, especially encryption methods, designed to stay secure against powerful future quantum computers that could break today’s digital locks. For investors, it signals which products, services or suppliers are preparing for a major shift in cybersecurity risk—similar to choosing a safe built to resist a new kind of drill—affecting costs, liability, competitive advantage and regulatory compliance across industries.
biometric digital signature technical
"The result is a biometric digital signature: a deterministic cryptographic proof..."
A biometric digital signature is an electronic authentication method that uses a person’s physical or behavioral traits—such as fingerprints, facial patterns, voice, or typing rhythm—combined with cryptographic technology to verify identity and sign documents. Investors should care because it can speed transactions, reduce fraud, and affect compliance and liability risks; like a unique electronic fingerprint, it ties approvals to a real person but brings data‑security and regulatory implications that can influence a company’s operational costs and trustworthiness.
lattice-based cryptography technical
"spanning two independent mathematical foundations: lattice-based and hash-based cryptography."
A form of digital encryption that uses complex grid-like math problems as the basis for secure keys, designed to be hard for both today's computers and future quantum machines to break. Think of it as a new kind of lock built from intricate lattice patterns: it matters to investors because companies that adopt or fail to adopt this technology can affect customer trust, regulatory compliance, product competitiveness, and long-term value when protecting sensitive data or transactions.
hash-based cryptography technical
"two independent mathematical foundations: lattice-based and hash-based cryptography."
A form of cryptography that uses one-way mathematical 'hash' functions to lock and verify data: inputs are turned into fixed-size outputs that act like digital fingerprints and cannot be reversed to reveal the original information. It matters to investors because it underpins the security and integrity of many digital assets and systems—from cryptocurrency ledgers to identity verification—so weaknesses or breakthroughs can affect asset safety, regulatory risks, and company valuations.
threshold multi-party computation technical
"separate trust domains using a threshold multi-party computation ceremony."
Threshold multi-party computation is a cryptographic technique that lets a group jointly compute a result or use a secret (like a private key or sensitive data) without any single participant ever revealing their own input. The “threshold” part means only a certain number of participants must cooperate to produce the outcome, so the system tolerates some members being offline or compromised. Investors care because it reduces single points of failure, improves custody and data privacy, and enables new secure services that can lower operational and regulatory risk.

AI-generated analysis. Not financial advice.

PrivacyKey Platform Integrates NIST Post-Quantum Standards and MPC Cryptographic Key Protection to Eliminate Quantum Threats and Future-Proof Identity Security

Denver, April 24, 2026 (GLOBE NEWSWIRE) -- authID, a leader in biometric identity verification, today announced a landmark advancement in identity security: the quantum-hardening of its PrivacyKey™ biometric digital signature platform. This achievement represents the industry’s first biometric authentication solution purpose-built to withstand the cryptographic threats posed by quantum computing.

Unlike conventional biometric systems that store facial templates on servers, leaving them vulnerable to future quantum-powered decryption attacks, authID’s PrivacyKey™ architecture stores no biometric data at rest. Every authentication event regenerates an ephemeral cryptographic keypair from a live biometric presentation, signs the transaction, and immediately destroys the private key. The result is a biometric digital signature: a deterministic cryptographic proof that a specific individual was present at the exact moment a transaction was authorized.

“The quantum era is not a distant threat; it’s an engineering reality today,” said Rhon Daguro, CEO of authID. “NIST has finalized its standards, regulatory timelines are accelerating, and organizations that rely on legacy biometric architectures are already running out of time. We built PrivacyKey™ from the ground up on a zero-storage, ephemeral-key foundation precisely because we knew this day was coming. What we’re announcing today isn’t a patch or an upgrade. It’s proof that the architecture we chose is the best one for the enterprise.”

authID’s engineering breakthrough represents two advances in quantum defense:

Quantum-Resistant Digital Signatures. PrivacyKey™ now supports three NIST-standardized post-quantum algorithms — ML-DSA-65, SLH-DSA-128s, and SLH-DSA-256s — spanning two independent mathematical foundations: lattice-based and hash-based cryptography. Organizations can select algorithms per operation, per policy, or per risk model, eliminating any single point of cryptographic failure.

Threshold MPC Key Protection (Sharding). Every PrivacyKeyMap™ (authID’s encrypted biometric guidance artifact) is protected by a unique AES-256 key that is never stored whole. Instead, each key is sharded (divided) across multiple independent nodes in separate trust domains using a threshold multi-party computation ceremony. No single node ever holds the complete key. No single server breach, compromised administrator, or insider threat can reconstruct it. Authentication requires all distributed nodes to collaborate in real time, regenerating the key only for a specific operation as needed.

“Integrating NIST-standardized, post-quantum algorithms means our customers are protected even in scenarios where one cryptographic family is compromised,” said Tom Szoke, founder and Chief Technology Officer of authID. “Combined with MPC and sharding, where no single node ever holds a complete key, we’ve created a system where the only path to authentication is a live person, in real time, collaborating with a distributed network. That’s not just quantum-resistant. That’s a fundamentally game-changing security model.”

Quantum computing, while not completely realized, has been considered a severe cybersecurity threat to break commonly used methods for encrypting data, communications, and user identities. While some organizations are simply hoping to postpone the inevitability of quantum break-ins with longer encryption keys, it’s theorized that the strongest quantum computer could infiltrate RSA-2048, the most powerful current encryption, in seconds. Since identities are the pathway for cyber-intruders, the need for quantum-resistant identity verification is more critical than ever.

“Our customers are making identity infrastructure decisions today that will define their security posture for the next decade,” said Erick Soto, Chief Product Officer at authID. “PrivacyKey™ gives them the flexibility to choose their quantum algorithm per operation and per risk profile, without rearchitecting their workflows. The ability to enforce biometric-bound, quantum-hardened digital signatures at the transaction level is a capability no other platform offers. We’re giving enterprises a way to get ahead of the quantum threat without waiting for it to arrive.”

The quantum-resistant PrivacyKey™ platform is available now for enterprise customers seeking to future-proof their identity and authentication infrastructure. For the authID whitepaper on this solution, visit

https://authid.ai/downloads/authid-quantum-resistant-biometric-authentication.pdf

About authID Inc.

authID® (Nasdaq: AUID) ensures enterprises “Know Who's Behind the Device™” for every customer or employee login and transaction through its easy-to-integrate, patented, biometric identity platform. authID quickly and accurately verifies a user's identity, preventing cybercriminals from compromising account openings or taking over accounts. Leveraging a 1-in-1-billion False Positive Rate for the highest level of assurance, coupled with industry-leading speed and privacy-preserving technology, authID provides the most secure digital identity experience. authID’s IDX platform secures the distributed workforce of employees, contractors, and vendors, as well as bringing authorization and accountability for AI agents. By creating a biometric root of trust for each user, authID stops fraud at onboarding, detects and stops deepfakes, eliminates password risks and costs, and provides the fastest, frictionless, and most accurate user identity experience in the industry. For more information, please visit www.authID.ai

authID Investor Relations
investor-relations@authID.ai


FAQ

What did authID (AUID) announce on April 24, 2026 regarding PrivacyKey™?

authID announced a quantum-resistant upgrade to PrivacyKey™ supporting three NIST post-quantum algorithms. According to the company, the platform uses ephemeral keypairs and MPC sharding to avoid storing biometric data at rest.

Which post-quantum algorithms does authID PrivacyKey™ support for AUID customers?

PrivacyKey™ supports ML-DSA-65, SLH-DSA-128s, and SLH-DSA-256s. According to the company, customers can select algorithms per operation, policy, or risk model.

How does authID’s PrivacyKey™ protect biometric data for AUID enterprises?

PrivacyKey™ stores no biometric data at rest; it regenerates ephemeral keypairs per authentication and destroys private keys afterward. According to the company, this creates a biometric digital signature tied to a live presentation.

What role does threshold MPC play in authID’s quantum-resistant solution (AUID)?

Threshold MPC shards AES-256 keys across independent nodes so no single node holds a full key. According to the company, nodes must collaborate in real time to regenerate keys for specific operations.

Is authID’s quantum-resistant PrivacyKey™ available now for enterprise deployment (AUID)?

Yes. The company states the quantum-resistant PrivacyKey™ platform is available now for enterprise customers seeking to future-proof identity and authentication infrastructure.

How can enterprises learn more or access authID’s quantum-resistant PrivacyKey™ details (AUID)?

Enterprises can download the authID whitepaper linked by the company for full technical details and deployment guidance. According to authID, the whitepaper explains algorithms, MPC, and integration notes.