An overview of information-theoretic security and privacy: Metrics, limits and applications
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
An optimality summary: Secret key agreement with physical unclonable functions
O Günlü, RF Schaefer - Entropy, 2020 - mdpi.com
We address security and privacy problems for digital devices and biometrics from an
information-theoretic optimality perspective to conduct authentication, message …
information-theoretic optimality perspective to conduct authentication, message …
Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels
V Yachongka, H Yagi, H Ochiai - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Secret-key agreement using physical identifiers is a promising security protocol for the
authentication of users and devices with small chips, owing to its lightweight security. In the …
authentication of users and devices with small chips, owing to its lightweight security. In the …
Key agreement with physical unclonable functions and biometric identifiers
O Gunlu - Cryptology ePrint Archive, 2021 - eprint.iacr.org
This thesis addresses security and privacy problems for digital devices and biometrics,
where a secret key is generated for authentication, identification, or secure computations. A …
where a secret key is generated for authentication, identification, or secure computations. A …
Secret key-based authentication with passive eavesdropper for scalar Gaussian sources
We analyze the fundamental trade-off of secret key-based authentication systems in the
presence of an eavesdropper for correlated Gaussian sources. A complete characterization …
presence of an eavesdropper for correlated Gaussian sources. A complete characterization …
Biometric and physical identifiers with correlated noise for controllable private authentication
The problem of secret-key based authentication under privacy and storage constraints on
the source sequence is considered. The identifier measurement channels during …
the source sequence is considered. The identifier measurement channels during …
Multi-entity and multi-enrollment key agreement with correlated noise
O Günlü - IEEE Transactions on Information Forensics and …, 2020 - ieeexplore.ieee.org
A basic model for key agreement with a remote (or hidden) source is extended to a multi-
user model with joint secrecy and privacy constraints over all entities that do not trust each …
user model with joint secrecy and privacy constraints over all entities that do not trust each …
Secure multi-function computation with private remote sources
We consider a distributed function computation problem in which parties observing noisy
versions of a remote source facilitate the computation of a function of their observations at a …
versions of a remote source facilitate the computation of a function of their observations at a …
Secret-key agreement using physical identifiers for degraded and less noisy authentication channels
Secret-key agreement based on biometric or physical identifiers is a promising security
protocol for authenticating users or devices with small chips and has been extensively …
protocol for authenticating users or devices with small chips and has been extensively …
Controllable key agreement with correlated noise
O Günlü, RF Schaefer - IEEE Journal on Selected Areas in …, 2021 - ieeexplore.ieee.org
The problem of secret-key-based authentication under privacy and storage constraints on
the source sequence is considered. Identifier measurement channels during authentication …
the source sequence is considered. Identifier measurement channels during authentication …