Biometric Identification Systems With Both Chosen and Generated Secret Keys by Allowing Correlation

06/29/2022
by   Vamoua Yachongka, et al.
0

We propose a biometric identification system where the chosen- and generated-secret keys are used simultaneously, and investigate its fundamental limits from information-theoretic perspectives. The system consists of two phases: enrollment and identification phases. In the enrollment phase, for each user, the encoder uses a secret key, which is chosen independently, and the biometric identifier to generate another secret key and a helper data. In the identification phase, observing the biometric sequence of the identified user, the decoder estimates index, chosen- and generated-secret keys of the identified user based on the helper data stored in the system database. In this study, the capacity region of such a system is characterized. In the problem setting, we allow chosen- and generated-secret keys to be correlated. As a result, by permitting the correlation of the two secret keys, the sum rate of the identification, chosen- and generated-secret key rates can achieve a larger value compared to the case where the keys do not correlate. Moreover, the minimum amount of the storage rate changes in accordance with both the identification and chosen-secret key rates, but that of the privacy-leakage rate depends only on the identification rate.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/08/2019

Fundamental Limits of Identification System With Secret Binding Under Noisy Enrollment

We investigate fundamental limits among identification, secrecy, templat...
research
04/04/2018

Controllable Identifier Measurements for Private Authentication with Secret Keys

The problem of secret-key based authentication under a privacy constrain...
research
12/24/2022

Bernoulli honeywords

Decoy passwords, or “honeywords,” planted in a credential database can a...
research
02/28/2023

Publicly verifiable delegative democracy with secret voting power

We use a commitment scheme to track every individual's voting power on a...
research
10/21/2020

Biometric Identification Systems With Noisy Enrollment for Gaussian Source

In the present paper, we investigate the fundamental trade-off of identi...
research
07/13/2020

The Blockchain Based Auditor on Secret key Life Cycle in Reconfigurable Platform

The growing sophistication of cyber attacks, vulnerabilities in high com...
research
02/28/2019

Shared Secret Key Generation via Carrier Frequency Offsets

This work presents a novel method to generate secret keys shared between...

Please sign up or login with your details

Forgot password? Click here to reset