TY - GEN
T1 - Secure Storage for Identification
AU - Baur, Sebastian
AU - Deppe, Christian
AU - Boche, Holger
N1 - Publisher Copyright:
© 2018 IEEE.
PY - 2018/8/24
Y1 - 2018/8/24
N2 - Ahlswede and Dueck introduced identification via channels as a new paradigm in information theory. They showed that the number of messages that can reliably be identified over a noisy channel grows doubly exponentially with the block length. In this work we also consider identification, but we assume that messages are stored on a database such that they can be identified. Additionally the legitimate users have access to the output of a source. This source allows us to store messages securely. It is also used to increase the number of messages that can be stored securely on the database and identified reliably. We define a protocol for secure storage for identification such that the number of stored messages that can be identified grows doubly exponentially with the number of symbols read from the source and the number of storage cells available respectively. We also consider the privacy leakage of the protocols used for identification. As a by-product we also get new results on common randomness generation.
AB - Ahlswede and Dueck introduced identification via channels as a new paradigm in information theory. They showed that the number of messages that can reliably be identified over a noisy channel grows doubly exponentially with the block length. In this work we also consider identification, but we assume that messages are stored on a database such that they can be identified. Additionally the legitimate users have access to the output of a source. This source allows us to store messages securely. It is also used to increase the number of messages that can be stored securely on the database and identified reliably. We define a protocol for secure storage for identification such that the number of stored messages that can be identified grows doubly exponentially with the number of symbols read from the source and the number of storage cells available respectively. We also consider the privacy leakage of the protocols used for identification. As a by-product we also get new results on common randomness generation.
UR - http://www.scopus.com/inward/record.url?scp=85053466956&partnerID=8YFLogxK
U2 - 10.1109/SPAWC.2018.8445910
DO - 10.1109/SPAWC.2018.8445910
M3 - Conference contribution
AN - SCOPUS:85053466956
SN - 9781538635124
T3 - IEEE Workshop on Signal Processing Advances in Wireless Communications, SPAWC
BT - 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2018
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 19th IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2018
Y2 - 25 June 2018 through 28 June 2018
ER -