An overview of information-theoretic security and privacy: Metrics, limits and applications

M Bloch, O Günlü, A Yener, F Oggier… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …

An optimality summary: Secret key agreement with physical unclonable functions

O Günlü, RF Schaefer - Entropy, 2020 - mdpi.com
We address security and privacy problems for digital devices and biometrics from an
information-theoretic optimality perspective to conduct authentication, message …

Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels

V Yachongka, H Yagi, H Ochiai - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Secret-key agreement using physical identifiers is a promising security protocol for the
authentication of users and devices with small chips, owing to its lightweight security. In the …

Key agreement with physical unclonable functions and biometric identifiers

O Gunlu - Cryptology ePrint Archive, 2021 - eprint.iacr.org
This thesis addresses security and privacy problems for digital devices and biometrics,
where a secret key is generated for authentication, identification, or secure computations. A …

Secret key-based authentication with passive eavesdropper for scalar Gaussian sources

V Yachongka, H Yagi, Y Oohama - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
We analyze the fundamental trade-off of secret key-based authentication systems in the
presence of an eavesdropper for correlated Gaussian sources. A complete characterization …

Biometric and physical identifiers with correlated noise for controllable private authentication

O Günlü, RF Schaefer, HV Poor - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
The problem of secret-key based authentication under privacy and storage constraints on
the source sequence is considered. The identifier measurement channels during …

Multi-entity and multi-enrollment key agreement with correlated noise

O Günlü - IEEE Transactions on Information Forensics and …, 2020 - ieeexplore.ieee.org
A basic model for key agreement with a remote (or hidden) source is extended to a multi-
user model with joint secrecy and privacy constraints over all entities that do not trust each …

Secure multi-function computation with private remote sources

O Günlü, M Bloch, RF Schaefer - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
We consider a distributed function computation problem in which parties observing noisy
versions of a remote source facilitate the computation of a function of their observations at a …

Secret-key agreement using physical identifiers for degraded and less noisy authentication channels

V Yachongka, H Yagi, H Ochiai - 2022 IEEE Information Theory …, 2022 - ieeexplore.ieee.org
Secret-key agreement based on biometric or physical identifiers is a promising security
protocol for authenticating users or devices with small chips and has been extensively …

Controllable key agreement with correlated noise

O Günlü, RF Schaefer - IEEE Journal on Selected Areas in …, 2021 - ieeexplore.ieee.org
The problem of secret-key-based authentication under privacy and storage constraints on
the source sequence is considered. Identifier measurement channels during authentication …