Secret Key-based Authentication With Passive Eavesdropper for Scalar Gaussian Sources

02/21/2022
by   Vamoua Yachongka, et al.
0

We analyze the fundamental trade-off of secret key-based authentication systems in the presence of an eavesdropper for correlated Gaussian sources. A complete characterization of trade-off among secret-key, storage, and privacy-leakage rates of both generated and chosen secret models is provided. One of the main contributions is revealing that unlike the known results for discrete sources, there is no need for the second auxiliary random variable in characterizing the capacity regions for the Gaussian cases. In addition, it is shown that the strong secrecy for secrecy-leakage of the systems can be achieved by an information-spectrum approach, and the parametric expressions (computable forms) of the capacity regions are also derived.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/22/2022

Secret-Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels

Secret-key agreement based on biometric or physical identifiers is a pro...
research
10/21/2020

Biometric Identification Systems With Noisy Enrollment for Gaussian Source

In the present paper, we investigate the fundamental trade-off of identi...
research
06/21/2022

Secret key generation from Gaussian sources using lattice-based extractors

We propose a lattice-based scheme for secret key generation from Gaussia...
research
05/08/2019

Fundamental Limits of Identification System With Secret Binding Under Noisy Enrollment

We investigate fundamental limits among identification, secrecy, templat...
research
05/17/2020

Multi-Entity and Multi-Enrollment Key Agreement with Correlated Noise

A basic model for key agreement with a remote (or hidden) source is exte...
research
07/12/2021

Quality of Service Guarantees for Physical Unclonable Functions

We consider a secret key agreement problem in which noisy physical unclo...
research
02/26/2020

Secure and Reliable Key Agreement with Physical Unclonable Functions

Different transforms used in binding a secret key to correlated physical...

Please sign up or login with your details

Forgot password? Click here to reset