Secure Storage for Identification

Sebastian Baur, Christian Deppe, Holger Boche

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Ahlswede and Dueck introduced identification via channels as a new paradigm in information theory. They showed that the number of messages that can reliably be identified over a noisy channel grows doubly exponentially with the block length. In this work we also consider identification, but we assume that messages are stored on a database such that they can be identified. Additionally the legitimate users have access to the output of a source. This source allows us to store messages securely. It is also used to increase the number of messages that can be stored securely on the database and identified reliably. We define a protocol for secure storage for identification such that the number of stored messages that can be identified grows doubly exponentially with the number of symbols read from the source and the number of storage cells available respectively. We also consider the privacy leakage of the protocols used for identification. As a by-product we also get new results on common randomness generation.

Original languageEnglish
Title of host publication2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Print)9781538635124
DOIs
StatePublished - 24 Aug 2018
Event19th IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2018 - Kalamata, Greece
Duration: 25 Jun 201828 Jun 2018

Publication series

NameIEEE Workshop on Signal Processing Advances in Wireless Communications, SPAWC
Volume2018-June

Conference

Conference19th IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2018
Country/TerritoryGreece
CityKalamata
Period25/06/1828/06/18

Fingerprint

Dive into the research topics of 'Secure Storage for Identification'. Together they form a unique fingerprint.

Cite this