Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication

01/03/2020
by   Onur Günlü, et al.
1

The problem of secret-key based authentication under privacy and storage constraints on the source sequence is considered. The identifier measurement channels during authentication are assumed to be controllable via a cost-constrained action sequence. Single-letter inner and outer bounds for the key-leakage-storage-cost regions are derived for a generalization of a classic two-terminal key agreement model with an eavesdropper that observes a sequence that is correlated with the sequences observed by the legitimate terminals. The additions to the model are that the encoder observes a noisy version of a remote source, and the noisy output and the remote source output together with an action sequence are given as inputs to the measurement channel at the decoder. Thus, correlation is introduced between the noise components on the encoder and decoder measurements. The model with a secret-key generated by an encoder is extended to the randomized models, where a secret-key is embedded to the encoder. The results are relevant for several user and device authentication scenarios including physical and biometric identifiers with multiple measurements that provide diversity and multiplexing gains. To illustrate the behavior of the rate region, achievable (secret-key rate, storage-rate, cost) tuples are given for binary identifiers and measurement channels that can be represented as a set of binary symmetric subchannels. The gains from using an action sequence such as a large secret-key rate at a significantly small hardware cost, are illustrated to motivate the use of low-complexity transform-coding algorithms with cost-constrained actions.

READ FULL TEXT
research
04/04/2018

Controllable Identifier Measurements for Private Authentication with Secret Keys

The problem of secret-key based authentication under a privacy constrain...
research
05/17/2020

Multi-Entity and Multi-Enrollment Key Agreement with Correlated Noise

A basic model for key agreement with a remote (or hidden) source is exte...
research
08/22/2022

Secret-Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels

Secret-key agreement based on biometric or physical identifiers is a pro...
research
07/01/2019

Private Authentication with Physical Identifiers Through Broadcast Channel Measurements

A basic model for key agreement with biometric or physical identifiers i...
research
07/12/2021

Quality of Service Guarantees for Physical Unclonable Functions

We consider a secret key agreement problem in which noisy physical unclo...
research
01/11/2022

Function Computation Under Privacy, Secrecy, Distortion, and Communication Constraints

The problem of reliable function computation is extended by imposing pri...
research
01/22/2021

Rate of Prefix-free Codes in LQG Control Systems with Side Information

In this work, we study an LQG control system where one of two feedback c...

Please sign up or login with your details

Forgot password? Click here to reset