Private authentication with controllable measurement

Kittipong Kittichokechai, Onur Gunlu, Rafael F. Schaefer, Giuseppe Caire

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations


We consider the problem of secret key-based authentication under a privacy constraint on the enrolled source data. The user's measurement in the authentication phase is assumed to be controllable via a cost-constrained 'action' sequence. We provide a single-letter characterization of the optimal tradeoff among the secret key rate, storage rate, leakage rate, and action cost. The result can be relevant for several user-authentication scenarios including hardware-based and biometric authentication with multiple measurements. Moreover, our result includes, as a special case, a new result for secret-key generation with action-dependent side information where there is no privacy constraint on the source sequence.

Original languageEnglish
Title of host publicationConference Record of the 50th Asilomar Conference on Signals, Systems and Computers, ACSSC 2016
EditorsMichael B. Matthews
PublisherIEEE Computer Society
Number of pages5
ISBN (Electronic)9781538639542
StatePublished - 1 Mar 2017
Externally publishedYes
Event50th Asilomar Conference on Signals, Systems and Computers, ACSSC 2016 - Pacific Grove, United States
Duration: 6 Nov 20169 Nov 2016

Publication series

NameConference Record - Asilomar Conference on Signals, Systems and Computers
ISSN (Print)1058-6393


Conference50th Asilomar Conference on Signals, Systems and Computers, ACSSC 2016
Country/TerritoryUnited States
CityPacific Grove


Dive into the research topics of 'Private authentication with controllable measurement'. Together they form a unique fingerprint.

Cite this