论文标题
具有相关噪声的生物识别和物理标识符,可控制的私人身份验证
Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication
论文作者
论文摘要
考虑了在源序列上的隐私和存储约束下基于密钥的身份验证问题。假定身份验证期间的标识符测量通道可以通过成本约束的动作序列可控。钥匙孔存储成本区域的单个字母内部和外部边界是通过窃听器的经典两端密钥一致性模型的概括来概括的,该模型观察到与合法终端观察到的序列相关的序列。该模型的添加是编码器观察远程源的嘈杂版本,嘈杂的输出和远程源输出与动作序列一起作为对解码器的测量通道的输入。因此,在编码器和解码器测量值上的噪声组件之间引入了相关性。编码器生成的秘密密钥的模型扩展到随机模型,其中秘密键嵌入到编码器中。结果与几种用户和设备身份验证方案有关,包括物理和生物识别标识符,并具有多个可提供多样性和多路复用增长的测量值。为了说明速率区域的行为,为二进制标识符和测量通道提供了可实现的(秘密键,存储率,成本)元素,可以表示为二进制对称亚渠道的混合物。说明了使用动作序列(例如大型秘密速率)以相当小的硬件成本进行的收益,以激发使用低复杂性转换编码算法的使用,并具有成本约束的动作。
The problem of secret-key based authentication under privacy and storage constraints on the source sequence is considered. The identifier measurement channels during authentication are assumed to be controllable via a cost-constrained action sequence. Single-letter inner and outer bounds for the key-leakage-storage-cost regions are derived for a generalization of a classic two-terminal key agreement model with an eavesdropper that observes a sequence that is correlated with the sequences observed by the legitimate terminals. The additions to the model are that the encoder observes a noisy version of a remote source, and the noisy output and the remote source output together with an action sequence are given as inputs to the measurement channel at the decoder. Thus, correlation is introduced between the noise components on the encoder and decoder measurements. The model with a secret key generated by an encoder is extended to the randomized models, where a secret-key is embedded to the encoder. The results are relevant for several user and device authentication scenarios including physical and biometric identifiers with multiple measurements that provide diversity and multiplexing gains. To illustrate the behavior of the rate region, achievable (secret-key rate, storage-rate, cost) tuples are given for binary identifiers and measurement channels that can be represented as a mixture of binary symmetric subchannels. The gains from using an action sequence such as a large secret-key rate at a significantly small hardware cost, are illustrated to motivate the use of low-complexity transform-coding algorithms with cost-constrained actions.