Controllable Identifier Measurements for Private Authentication With Secret Keys

被引:17
|
作者
Guenlue, Onur [1 ]
Kittichokechai, Kittipong [2 ,3 ]
Schaefer, Rafael F. [4 ]
Caire, Giuseppe [2 ]
机构
[1] Tech Univ Munich, Chair Commun Engn, D-80333 Munich, Germany
[2] Tech Univ Berlin, Commun & Informat Theory Chair, D-10623 Berlin, Germany
[3] Ericsson Res, S-16483 Stockholm, Sweden
[4] Tech Univ Berlin, Informat Theory & Applicat Chair, D-10623 Berlin, Germany
关键词
Private authentication; information theoretic security; action dependent privacy; hidden source; SIDE INFORMATION; BIOMETRICS; AGREEMENT;
D O I
10.1109/TIFS.2018.2806937
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The problem of secret-key based authentication under a privacy constraint on the source sequence is considered. The identifier measurements during authentication are assumed to be controllable via a cost-constrained "action" sequence. Single-letter characterizations of the optimal trade-off among the secret-key rate, storage rate, privacy-leakage rate, and action cost are given for the four problems where noisy or noiseless measurements of the source are enrolled to generate or embed secret keys. The results are relevant for several user-authentication scenarios, including physical and biometric authentications with multiple measurements. Our results include, as special cases, new results for secret-key generation and embedding with action-dependent side information without any privacy constraint on the enrolled source sequence.
引用
收藏
页码:1945 / 1959
页数:15
相关论文
共 50 条
  • [31] Broadcast Channel with Confidential Messages and Secret Keys
    Iyer, Krishnamoorthy
    2016 TWENTY SECOND NATIONAL CONFERENCE ON COMMUNICATION (NCC), 2016,
  • [32] Extracting secret keys from integrated circuits
    Lim, D
    Lee, JW
    Gassend, B
    Suh, GE
    van Dijk, M
    Devadas, S
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2005, 13 (10) : 1200 - 1205
  • [33] Protecting secret keys in a compromised computational system
    Mitchell, WPR
    INFORMATION HIDING, PROCEEDINGS, 2000, 1768 : 448 - 462
  • [34] FOUR CAN KEEP A SECRET WITH QUANTUM KEYS
    不详
    NATURE, 2021, 594 (7863) : 305 - 305
  • [35] Encryption of speech signal with multiple secret keys
    Slimani, Dalila
    Merazka, Fatiha
    1ST INTERNATIONAL CONFERENCE ON NATURAL LANGUAGE AND SPEECH PROCESSING, 2018, 128 : 79 - 88
  • [36] Sharing secret keys along a Eulerian circuit
    Mizuki, T
    Shizuya, H
    Nishizeki, T
    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART III-FUNDAMENTAL ELECTRONIC SCIENCE, 2000, 83 (04): : 33 - 42
  • [37] THE SECRET KEYS OF ISRAEL - FRENCH - GRAD,AD
    REIX, A
    REVUE PHILOSOPHIQUE DE LA FRANCE ET DE L ETRANGER, 1990, 115 (02): : 456 - 457
  • [38] Management of secret keys: Dynamic key handling
    Daemen, J
    STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 264 - 276
  • [39] Secure Broadcasting Using Independent Secret Keys
    Schaefer, Rafael F.
    Khisti, Ashish
    Poor, H. Vincent
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2018, 66 (02) : 644 - 661
  • [40] Five keys of the secret world of Remedios Varo
    Serrano, Julio
    CUADERNOS HISPANOAMERICANOS, 2016, (788) : 133 - 136