2015 IEEE International Symposium on Information Theory (ISIT) 2015
DOI: 10.1109/isit.2015.7282764
|View full text |Cite
|
Sign up to set email alerts
|

Secret key-based authentication with a privacy constraint

Abstract: We consider problems of authentication using secret key generation under a privacy constraint on the enrolled source data. An adversary who has access to the stored description and correlated side information tries to deceive the authentication as well as learn about the source. We characterize the optimal tradeoff between the compression rate of the stored description, the leakage rate of the source data, and the exponent of the adversary's maximum false acceptance probability. The related problem of secret k… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
24
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 12 publications
(25 citation statements)
references
References 18 publications
1
24
0
Order By: Relevance
“…Consider the compression-leakage-key region given in [19,Theorem 2] for the generated-secret model and a visible source. We compare this region with the rate region R gs to illustrate the effects of the cost-constrained action sequence.…”
Section: A Rate Region Comparisons and Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…Consider the compression-leakage-key region given in [19,Theorem 2] for the generated-secret model and a visible source. We compare this region with the rate region R gs to illustrate the effects of the cost-constrained action sequence.…”
Section: A Rate Region Comparisons and Discussionmentioning
confidence: 99%
“…We compare this region with the rate region R gs to illustrate the effects of the cost-constrained action sequence. In particular, we observe that the action A appears as a conditioning random variable in each mutual information term in [19,Theorem 2], the new storage and privacy-leakage rate limits are increased by the rate-distortion coding amount of I(X; A), and the probability distribution of A is limited by an expected cost constraint. Therefore, the cost-constrained action sequence A n brings the possibility of enlarging the rate region, which recovers the rate region in [19,Theorem 2] by choosing a constant action with fixed cost.…”
Section: A Rate Region Comparisons and Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…i) When there is only one user in the database, i.e., |W (n) | = 1, the problem reduces to authentication with a privacy constraint studied in [12] (see e.g., Fig. 2).…”
Section: Remark 1 (Layered Random Binning)mentioning
confidence: 99%