Controllable Identifier Measurements for Private Authentication with Secret Keys

04/04/2018
by   Onur Günlü, et al.
1

The problem of secret-key based authentication under a privacy constraint on the source sequence is considered. The identifier measurements during authentication are assumed to be controllable via a cost-constrained "action" sequence. Single-letter characterizations of the optimal trade-off among the secret-key rate, storage rate, privacy-leakage rate, and action cost are given for the four problems where noisy or noiseless measurements of the source are enrolled to generate or embed secret keys. The results are relevant for several user-authentication scenarios including physical and biometric authentications with multiple measurements. Our results include, as special cases, new results for secret-key generation and embedding with action-dependent side information without any privacy constraint on the enrolled source sequence.

READ FULL TEXT
research
01/03/2020

Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication

The problem of secret-key based authentication under privacy and storage...
research
07/08/2023

Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and Impact

Containerization allows bundling applications and their dependencies int...
research
06/29/2022

Biometric Identification Systems With Both Chosen and Generated Secret Keys by Allowing Correlation

We propose a biometric identification system where the chosen- and gener...
research
05/31/2018

False-Accept/False-Reject Trade-offs in Biometric Authentication Systems

Biometric authentication systems, based on secret key generation, work a...
research
01/17/2019

Private Authentication: Optimal Information Theoretic Schemes

The main security service in the connected world of cyber physical syste...
research
07/01/2019

Private Authentication with Physical Identifiers Through Broadcast Channel Measurements

A basic model for key agreement with biometric or physical identifiers i...
research
07/13/2020

The Blockchain Based Auditor on Secret key Life Cycle in Reconfigurable Platform

The growing sophistication of cyber attacks, vulnerabilities in high com...

Please sign up or login with your details

Forgot password? Click here to reset