TY - JOUR
T1 - Privacy, Secrecy, and Storage with Multiple Noisy Measurements of Identifiers
AU - Gunlu, Onur
AU - Kramer, Gerhard
N1 - Publisher Copyright:
© 2005-2012 IEEE.
PY - 2018/11
Y1 - 2018/11
N2 - The key-leakage-storage region is derived for a generalization of a classic two-terminal key agreement model. The additions to the model are that the encoder observes a hidden, or noisy, version of the identifier, and that the encoder and decoder can perform multiple measurements. To illustrate the behavior of the region, the theory is applied to binary identifiers and noise modeled via binary symmetric channels. In particular, the key-leakage-storage region is simplified by applying Mrs. Gerber's lemma twice in different directions to a Markov chain. The growth in the region as the number of measurements increases is quantified. The amount by which the privacy-leakage rate reduces for a hidden identifier as compared to a noise-free (visible) identifier at the encoder is also given. If the encoder incorrectly models the source as visible, it is shown that substantial secrecy leakage may occur and the reliability of the reconstructed key might decrease.
AB - The key-leakage-storage region is derived for a generalization of a classic two-terminal key agreement model. The additions to the model are that the encoder observes a hidden, or noisy, version of the identifier, and that the encoder and decoder can perform multiple measurements. To illustrate the behavior of the region, the theory is applied to binary identifiers and noise modeled via binary symmetric channels. In particular, the key-leakage-storage region is simplified by applying Mrs. Gerber's lemma twice in different directions to a Markov chain. The growth in the region as the number of measurements increases is quantified. The amount by which the privacy-leakage rate reduces for a hidden identifier as compared to a noise-free (visible) identifier at the encoder is also given. If the encoder incorrectly models the source as visible, it is shown that substantial secrecy leakage may occur and the reliability of the reconstructed key might decrease.
KW - Information theoretic privacy
KW - MRS. Gerber's lemma
KW - hidden source model
KW - physical unclonable functions
UR - http://www.scopus.com/inward/record.url?scp=85046449509&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2018.2834303
DO - 10.1109/TIFS.2018.2834303
M3 - Article
AN - SCOPUS:85046449509
SN - 1556-6013
VL - 13
SP - 2872
EP - 2883
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
IS - 11
ER -