2019
DOI: 10.1109/tifs.2018.2890813
|View full text |Cite
|
Sign up to set email alerts
|

Secure Storage for Identification; Random Resources and Privacy Leakage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…Random numbers are used extensively in many applications, such as cryptography 7 and scientific modeling, 8 where their non-deterministic properties and unpredictability are essential. The source of randomness (i.e., the entropy source) is a crucial factor for whether correlations between generated numbers are present, and this has a great impact on the randomness and utility of the output.…”
Section: Introductionmentioning
confidence: 99%
“…Random numbers are used extensively in many applications, such as cryptography 7 and scientific modeling, 8 where their non-deterministic properties and unpredictability are essential. The source of randomness (i.e., the entropy source) is a crucial factor for whether correlations between generated numbers are present, and this has a great impact on the randomness and utility of the output.…”
Section: Introductionmentioning
confidence: 99%
“…Burnashev [10] has shown that for the white Gaussian channel without bandwidth constraint and finite Shannon capacity, the corresponding identification capacity is infinite. Secure identification for discrete alphabets has been extensively studied [6], [11], [12] over the recent decades due to its important potential use in many future scenarios. Indeed, for discrete channels, it was proved in [11] that secure identification is robust under channel uncertainty and against jamming attacks.…”
Section: Introductionmentioning
confidence: 99%