Private authentication with controllable measurement

Kittipong Kittichokechai, Onur Gunlu, Rafael F. Schaefer, Giuseppe Caire

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

We consider the problem of secret key-based authentication under a privacy constraint on the enrolled source data. The user's measurement in the authentication phase is assumed to be controllable via a cost-constrained 'action' sequence. We provide a single-letter characterization of the optimal tradeoff among the secret key rate, storage rate, leakage rate, and action cost. The result can be relevant for several user-authentication scenarios including hardware-based and biometric authentication with multiple measurements. Moreover, our result includes, as a special case, a new result for secret-key generation with action-dependent side information where there is no privacy constraint on the source sequence.

Original languageEnglish
Title of host publicationConference Record of the 50th Asilomar Conference on Signals, Systems and Computers, ACSSC 2016
EditorsMichael B. Matthews
PublisherIEEE Computer Society
Pages1680-1684
Number of pages5
ISBN (Electronic)9781538639542
DOIs
StatePublished - 1 Mar 2017
Externally publishedYes
Event50th Asilomar Conference on Signals, Systems and Computers, ACSSC 2016 - Pacific Grove, United States
Duration: 6 Nov 20169 Nov 2016

Publication series

NameConference Record - Asilomar Conference on Signals, Systems and Computers
ISSN (Print)1058-6393

Conference

Conference50th Asilomar Conference on Signals, Systems and Computers, ACSSC 2016
Country/TerritoryUnited States
CityPacific Grove
Period6/11/169/11/16

Fingerprint

Dive into the research topics of 'Private authentication with controllable measurement'. Together they form a unique fingerprint.

Cite this