Controllable Identifier Measurements for Private Authentication With Secret Keys

被引:17
|
作者
Guenlue, Onur [1 ]
Kittichokechai, Kittipong [2 ,3 ]
Schaefer, Rafael F. [4 ]
Caire, Giuseppe [2 ]
机构
[1] Tech Univ Munich, Chair Commun Engn, D-80333 Munich, Germany
[2] Tech Univ Berlin, Commun & Informat Theory Chair, D-10623 Berlin, Germany
[3] Ericsson Res, S-16483 Stockholm, Sweden
[4] Tech Univ Berlin, Informat Theory & Applicat Chair, D-10623 Berlin, Germany
关键词
Private authentication; information theoretic security; action dependent privacy; hidden source; SIDE INFORMATION; BIOMETRICS; AGREEMENT;
D O I
10.1109/TIFS.2018.2806937
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The problem of secret-key based authentication under a privacy constraint on the source sequence is considered. The identifier measurements during authentication are assumed to be controllable via a cost-constrained "action" sequence. Single-letter characterizations of the optimal trade-off among the secret-key rate, storage rate, privacy-leakage rate, and action cost are given for the four problems where noisy or noiseless measurements of the source are enrolled to generate or embed secret keys. The results are relevant for several user-authentication scenarios, including physical and biometric authentications with multiple measurements. Our results include, as special cases, new results for secret-key generation and embedding with action-dependent side information without any privacy constraint on the enrolled source sequence.
引用
收藏
页码:1945 / 1959
页数:15
相关论文
共 50 条
  • [21] Protecting secret keys with personal entropy
    Ellison, C
    Hall, C
    Milbert, R
    Schneier, B
    FUTURE GENERATION COMPUTER SYSTEMS, 2000, 16 (04) : 311 - 318
  • [22] A new method for exchanging secret keys
    Stickel, E
    Third International Conference on Information Technology and Applications, Vol 2, Proceedings, 2005, : 426 - 430
  • [23] Secret keys from quantum correlations
    Luetkenhaus, N.
    COMPUTER SCIENCE-RESEARCH AND DEVELOPMENT, 2006, 21 (1-2): : 29 - 37
  • [24] Skeleton Keys The Secret Life of Bone
    Tattersall, Ian
    SCIENCE, 2019, 363 (6432) : 1156 - 1156
  • [25] Secret key watermarking with changing keys
    Depovere, G
    Kalker, T
    2000 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL I, PROCEEDINGS, 2000, : 427 - 429
  • [26] Secret Keys from Channel Noise
    Ahmadi, Hadi
    Safavi-Naini, Reihaneh
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 266 - 283
  • [27] SKELETON KEYS The Secret Life of Bone
    George, Rose
    NEW YORK TIMES BOOK REVIEW, 2019, 124 (14): : 9 - 9
  • [28] 4(Secret) Keys to Student Engagement
    Jackson, Robyn
    Zmuda, Allison
    EDUCATIONAL LEADERSHIP, 2014, 72 (01) : 18 - 24
  • [29] Secure authentication with multiple parallel keys
    Kelsey, J
    Schneier, B
    SMART CARD RESEARCH AND APPLICATIONS, PROCEEDINGS, 2000, 1820 : 150 - 156
  • [30] Predicting secret keys via branch prediction
    Aciicmez, Onur
    Koc, Cetin Kaya
    Seifert, Jean-Pierre
    TOPICS IN CRYPTOLOGY - CT-RSA 2007, PROCEEDINGS, 2007, 4377 : 225 - +