TY - GEN
T1 - Secret Key Generation from a Biometric Source with an Eavesdropping Jammer
AU - Baur, Sebastian
AU - Boche, Holger
AU - Cai, Ning
N1 - Publisher Copyright:
© 2019 IEEE.
PY - 2019/4
Y1 - 2019/4
N2 - We consider secret key generation from a biometric source. We examine an information theoretic model where a legitimate user reads from the biometric source two times. A secret key is generated from the first output of the biometric source. From the second output of the biometric source this secret key is reconstructed. The corresponding outputs of the biometric source are modelled as jointly distributed random variables. We also assume that a helper message, generated after reading from the biometric source for the first time, is available to the legitimate user when reading from the biometric source for the second time. Additionally the helper message is assumed to be publicly available and an eavesdropper wants to learn the secret key from the helper message. We assume the biometric source is jammed before the legitimate user reads from the source for the second time. The jammer gets to know the public helper message too. Considering the secret key generation rate and the privacy leakage rate we characterize the corresponding capacity region taking into account protocols that guarantee perfect secrecy and uniform distribution of the key.
AB - We consider secret key generation from a biometric source. We examine an information theoretic model where a legitimate user reads from the biometric source two times. A secret key is generated from the first output of the biometric source. From the second output of the biometric source this secret key is reconstructed. The corresponding outputs of the biometric source are modelled as jointly distributed random variables. We also assume that a helper message, generated after reading from the biometric source for the first time, is available to the legitimate user when reading from the biometric source for the second time. Additionally the helper message is assumed to be publicly available and an eavesdropper wants to learn the secret key from the helper message. We assume the biometric source is jammed before the legitimate user reads from the source for the second time. The jammer gets to know the public helper message too. Considering the secret key generation rate and the privacy leakage rate we characterize the corresponding capacity region taking into account protocols that guarantee perfect secrecy and uniform distribution of the key.
UR - http://www.scopus.com/inward/record.url?scp=85083030300&partnerID=8YFLogxK
U2 - 10.1109/INFOCOMWKSHPS47286.2019.9093770
DO - 10.1109/INFOCOMWKSHPS47286.2019.9093770
M3 - Conference contribution
AN - SCOPUS:85083030300
T3 - INFOCOM 2019 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2019
BT - INFOCOM 2019 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2019
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2019 INFOCOM IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2019
Y2 - 29 April 2019 through 2 May 2019
ER -