Multi-Entity and Multi-Enrollment Key Agreement with Correlated Noise

05/17/2020
by   Onur Günlü, et al.
1

A basic model for key agreement with a remote (or hidden) source is extended to a multi-user model with joint secrecy and privacy constraints over all entities that do not trust each other after key agreement. Multiple entities using different measurements of the same source through broadcast channels (BCs) to agree on mutually-independent local secret keys are considered. Our model is the proper multi-user extension of the basic model since the encoder and decoder pairs are not assumed to trust other pairs after key agreement, unlike assumed in the literature. Strong secrecy constraints imposed on all secret keys jointly, which is more stringent than separate secrecy leakage constraints for each secret key considered in the literature, are satisfied. Inner bounds for maximum key rate, and minimum privacy-leakage and database-storage rates are proposed for any finite number of entities. Inner and outer bounds for degraded and less-noisy BCs are given to illustrate cases with strong privacy. A multi-enrollment model that is used for common physical unclonable functions is also considered to establish inner and outer bounds for key-leakage-storage regions that differ only in the Markov chains imposed. For this special case, the encoder and decoder measurement channels have the same channel transition matrix and secrecy leakage is measured for each secret key separately. We illustrate cases for which it is useful to have multiple enrollments as compared to a single enrollment and vice versa.

READ FULL TEXT
research
07/01/2019

Private Authentication with Physical Identifiers Through Broadcast Channel Measurements

A basic model for key agreement with biometric or physical identifiers i...
research
01/03/2020

Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication

The problem of secret-key based authentication under privacy and storage...
research
01/11/2022

Function Computation Under Privacy, Secrecy, Distortion, and Communication Constraints

The problem of reliable function computation is extended by imposing pri...
research
06/17/2021

Secure Multi-Function Computation with Private Remote Sources

We consider a distributed function computation problem in which parties ...
research
02/20/2021

A Novel Key Generation Scheme Using Quaternary PUF Responses and Wiretap Polar Coding

Physical unclonable functions (PUFs) are widely considered in secret key...
research
02/21/2022

Secret Key-based Authentication With Passive Eavesdropper for Scalar Gaussian Sources

We analyze the fundamental trade-off of secret key-based authentication ...
research
07/12/2021

Quality of Service Guarantees for Physical Unclonable Functions

We consider a secret key agreement problem in which noisy physical unclo...

Please sign up or login with your details

Forgot password? Click here to reset