Controllable Identifier Measurements for Private Authentication With Secret Keys

被引:17
|
作者
Guenlue, Onur [1 ]
Kittichokechai, Kittipong [2 ,3 ]
Schaefer, Rafael F. [4 ]
Caire, Giuseppe [2 ]
机构
[1] Tech Univ Munich, Chair Commun Engn, D-80333 Munich, Germany
[2] Tech Univ Berlin, Commun & Informat Theory Chair, D-10623 Berlin, Germany
[3] Ericsson Res, S-16483 Stockholm, Sweden
[4] Tech Univ Berlin, Informat Theory & Applicat Chair, D-10623 Berlin, Germany
关键词
Private authentication; information theoretic security; action dependent privacy; hidden source; SIDE INFORMATION; BIOMETRICS; AGREEMENT;
D O I
10.1109/TIFS.2018.2806937
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The problem of secret-key based authentication under a privacy constraint on the source sequence is considered. The identifier measurements during authentication are assumed to be controllable via a cost-constrained "action" sequence. Single-letter characterizations of the optimal trade-off among the secret-key rate, storage rate, privacy-leakage rate, and action cost are given for the four problems where noisy or noiseless measurements of the source are enrolled to generate or embed secret keys. The results are relevant for several user-authentication scenarios, including physical and biometric authentications with multiple measurements. Our results include, as special cases, new results for secret-key generation and embedding with action-dependent side information without any privacy constraint on the enrolled source sequence.
引用
收藏
页码:1945 / 1959
页数:15
相关论文
共 50 条
  • [1] Private Authentication with Controllable Measurement
    Kittichokechai, Kittipong
    Guenlue, Onur
    Schaefer, Rafael F.
    Caire, Giuseppe
    2016 50TH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, 2016, : 1680 - 1684
  • [2] Tighter Bounds on Entropy of Secret Keys in Authentication Codes
    Shikata, Junji
    2017 IEEE INFORMATION THEORY WORKSHOP (ITW), 2017, : 259 - 263
  • [3] Double secret keys and double random numbers authentication scheme
    Tian Junfeng
    Jiao-Hongqiang
    Ning, Li
    Tao, Liu
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 708 - 711
  • [4] Authentication Codes from ε-ASU Hash Functions with Partially Secret Keys
    Liu Shengli
    Tilborg, Henk van
    Weng Jian
    Chen Kefei
    CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (04) : 790 - 793
  • [5] Private Authentication Keys Based On Wearable Device EEG Recordings
    Yang, Hongxu
    Mihajlovic, Vojkan
    Ignatenko, Tanya
    2017 25TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2017, : 956 - 960
  • [6] Authentication Codes from-ASU Hash Functions with Partially Secret Keys
    LIU Shengli
    TILBORG Henk van
    WENG Jian
    CHEN Kefei
    Chinese Journal of Electronics, 2014, 23 (04) : 790 - 793
  • [7] Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication
    Guenlue, Onur
    Schaefer, Rafael F.
    Poor, H. Vincent
    2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2020, : 874 - 878
  • [8] Generating Secret Keys from Biometric Body Impedance Measurements
    Roeschlin, Marc
    Sluganovic, Ivo
    Martinovic, Ivan
    Tsudik, Gene
    Rasmussen, Kasper B.
    PROCEEDINGS OF THE 2016 ACM WORKSHOP ON PRIVACY IN THE ELECTRONIC SOCIETY (WPES'16), 2016, : 59 - 69
  • [9] Simultaneously Generating Secret and Private Keys in a Cooperative Pairwise-Independent Network
    Xu, Peng
    Ding, Zhiguo
    Dai, Xuchu
    Karagiannidis, George K.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) : 1139 - 1150
  • [10] Ultralightweight RFID Authentication Protocol Based on Random Partitions of Pseudorandom Identifier and Pre-shared Secret Value
    Ning Huansheng
    Liu Hong
    Yang Chen
    CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (04): : 701 - 707