Controllable Identifier Measurements for Private Authentication With Secret Keys

被引:17
|
作者
Guenlue, Onur [1 ]
Kittichokechai, Kittipong [2 ,3 ]
Schaefer, Rafael F. [4 ]
Caire, Giuseppe [2 ]
机构
[1] Tech Univ Munich, Chair Commun Engn, D-80333 Munich, Germany
[2] Tech Univ Berlin, Commun & Informat Theory Chair, D-10623 Berlin, Germany
[3] Ericsson Res, S-16483 Stockholm, Sweden
[4] Tech Univ Berlin, Informat Theory & Applicat Chair, D-10623 Berlin, Germany
关键词
Private authentication; information theoretic security; action dependent privacy; hidden source; SIDE INFORMATION; BIOMETRICS; AGREEMENT;
D O I
10.1109/TIFS.2018.2806937
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The problem of secret-key based authentication under a privacy constraint on the source sequence is considered. The identifier measurements during authentication are assumed to be controllable via a cost-constrained "action" sequence. Single-letter characterizations of the optimal trade-off among the secret-key rate, storage rate, privacy-leakage rate, and action cost are given for the four problems where noisy or noiseless measurements of the source are enrolled to generate or embed secret keys. The results are relevant for several user-authentication scenarios, including physical and biometric authentications with multiple measurements. Our results include, as special cases, new results for secret-key generation and embedding with action-dependent side information without any privacy constraint on the enrolled source sequence.
引用
收藏
页码:1945 / 1959
页数:15
相关论文
共 50 条
  • [41] False Secret Keys to Disturb Power Analysis
    Lee, Seungkwang
    Kim, Taesung
    2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018), 2018, : 296 - 298
  • [42] Secret Keys in Genus-2 SIDH
    Kunzweiler, Sabrina
    Ti, Yan Bo
    Weitkaemper, Charlotte
    SELECTED AREAS IN CRYPTOGRAPHY, 2022, 13203 : 483 - 507
  • [43] Highly Efficient Authentication for CAN by Identifier Reallocation With Ordered CMACs
    Groza, Bogdan
    Popa, Lucian
    Murvay, Pal-Stefan
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) : 6129 - 6140
  • [44] Verifiable Quantum Secret Sharing Protocol Based on Secret Authentication
    Du Yutao
    Bao Wansu
    Li Tan
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (01) : 212 - 217
  • [45] A scalable authentication model based on public keys
    Lin, Hongjun
    Luo, Ping
    Wang, Daoshun
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2008, 31 (04) : 375 - 386
  • [46] Deniable Authentication When Signing Keys Leak
    Chakraborty, Suvradip
    Hofheinz, Dennis
    Maurer, Ueli
    Rito, Guilherme
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT III, 2023, 14006 : 69 - 100
  • [47] Generation of Authentication Strings From Graphic Keys
    de Magalhaes, Sergio Tenreiro
    Revett, Kenneth
    Santos, Henrique M. D.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (3B): : 240 - 246
  • [48] Kuperee: an approach to authentication using public keys
    Hardjono, Thomas
    Zheng, Yuliang
    Seberry, Jennifer
    IFIP Transactions C: Communication Systems, 1994, (C-25): : 65 - 76
  • [49] KUPEREE - AN APPROACH TO AUTHENTICATION USING PUBLIC KEYS
    HARDJONO, T
    ZHENG, YL
    SEBERRY, J
    UPPER LAYER PROTOCOLS, ARCHITECTURES AND APPLICATIONS, 1994, 25 : 65 - 76
  • [50] ENCIPHERMENT WITH PUBLIC KEYS, AUTHENTICATION AND ELECTRONIC SIGNATURES
    DAVIES, DW
    JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 1980, 31 (01) : 110 - 110