2016
DOI: 10.1109/tit.2016.2609401
|View full text |Cite
|
Sign up to set email alerts
|

Secret Key-Based Identification and Authentication With a Privacy Constraint

Abstract: We consider the problem of identification and authentication based on secret key generation from some user-generated source data (e.g., a biometric source). The goal is to reliably identify users preenrolled in a database as well as authenticate them based on the estimated secret key while preserving the privacy of the enrolled data and of the generated keys. We characterize the optimal tradeoff between the identification rate, the compression rate of the users' source data, information leakage rate, and secre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(25 citation statements)
references
References 31 publications
0
25
0
Order By: Relevance
“…where > 0 is a fixed number, and δ → 0 as → 0; (a) follows from the union bound; (b) follows from Claim 2 and Claim 3. Since R C + R J > R I + I(U ; X) − I(U ; Y ) + δ due to (16), we obtain that Pr(E 51 |A) → 0 as N → ∞.…”
Section: Proof: the Proof Is Given In Appendixmentioning
confidence: 82%
See 2 more Smart Citations
“…where > 0 is a fixed number, and δ → 0 as → 0; (a) follows from the union bound; (b) follows from Claim 2 and Claim 3. Since R C + R J > R I + I(U ; X) − I(U ; Y ) + δ due to (16), we obtain that Pr(E 51 |A) → 0 as N → ∞.…”
Section: Proof: the Proof Is Given In Appendixmentioning
confidence: 82%
“…By taking both the privacy and secrecy into account, the privacy-secrecy trade-off in biometric authentication systems is characterized in [6], [14], [15]. The privacy and secrecy aspects in biometric identification systems that allow authentication are investigated in [7], [16], [17]. In [18], [19], the authors additionally considered noisy enrollment in a privacy-preserving biometric identification system.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In [13], key-based authentication is solved from the perspective of privacy-limited registration data. It is assumed that the user's measurement during the authentication phase is controlled through a cost-limited "action" sequence.…”
Section: A Conventional Security Methodsmentioning
confidence: 99%
“…The trade-off between the identification capacity and the storage is studied in [4]. By considering the privacy and secrecy aspects, biometric identification systems that allow authentication are studied in [2], [5], where the identification-secrecy-privacy tradeoff is studied. Multiple-use of biometric information in biometric authentication systems is considered in [6] to improve secrecy and efficiency.…”
Section: Introductionmentioning
confidence: 99%