Controllable key agreement with correlated noise

Publikation: Beitrag in FachzeitschriftForschungsartikelBeigetragenBegutachtung

Beitragende

  • Onur Günlü - , Technische Universität Berlin (Autor:in)
  • Rafael F. Schaefer - , Technische Universität Berlin (Autor:in)

Abstract

The problem of secret-key-based authentication under privacy and storage constraints on the source sequence is considered. Identifier measurement channels during authentication are assumed to be controllable via a cost-constrained action sequence. Inner and outer bounds for the key-leakage-storage-cost regions are derived for a generalization of the classic two-terminal key agreement model. Additions to the model are that the encoder observes a noisy version of a remote source, and this noisy output and the remote source output together with an action sequence are given as inputs to the measurement channel at the decoder. Thus, correlation is introduced between the noise components on the encoder and decoder measurements. The model with a key generated by an encoder is extended to the randomized models, where a key is embedded to the encoder. The results are relevant for several user and device authentication scenarios including physical and biometric identifiers with multiple measurements that provide diversity and multiplexing gains. Achievable (key, storage, cost) tuples are evaluated for binary identifiers and measurement channels represented as a mixture of binary symmetric subchannels. Significant gains from using an action sequence are illustrated to motivate the use of low-complexity transform-coding algorithms with cost-constrained actions.

Details

OriginalspracheEnglisch
Aufsatznummer9335630
Seiten (von - bis)82-94
Seitenumfang13
Fachzeitschrift IEEE Journal on selected areas in information theory : JSAIT
Jahrgang2
Ausgabenummer1
PublikationsstatusVeröffentlicht - März 2021
Peer-Review-StatusJa
Extern publiziertJa

Externe IDs

ORCID /0000-0002-1702-9075/work/165878340

Schlagworte

Schlagwörter

  • Controllable key agreement, Correlated noise, Cost constrained actions, Private authentication, Remote sources