ログイン
言語:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

{"_buckets": {"deposit": "022341a1-48f6-492a-a035-cbc252cc2394"}, "_deposit": {"created_by": 17, "id": "2000037", "owner": "17", "owners": [17], "owners_ext": {"displayname": "横浜国立大学附属図書館", "username": "yokokoku"}, "pid": {"revision_id": 0, "type": "depid", "value": "2000037"}, "status": "published"}, "_oai": {"id": "oai:ynu.repo.nii.ac.jp:02000037", "sets": ["496"]}, "author_link": [], "control_number": "2000037", "item_2_biblio_info_8": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2023-08-23", "bibliographicIssueDateType": "Issued"}, "bibliographicPageEnd": "5331", "bibliographicPageStart": "5316", "bibliographicVolumeNumber": "18", "bibliographic_titles": [{"bibliographic_title": "IEEE Transactions on Information Forensics and Security"}]}]}, "item_2_description_5": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "Secret-key agreement using physical identifiers is a promising security protocol for the authentication of users and devices with small chips, owing to its lightweight security. In the previous studies, the fundamental limits of such a protocol were analyzed, and the results showed that two auxiliary random variables were involved in the capacity region expressions. However, with two auxiliary random variables, it is difficult to directly apply the expressions to derive the computable forms of the capacity regions for certain information sources such as binary and Gaussian sources, which hold importance in practical applications. In this paper, we explore the structure of authentication channels and reveal that for the classes of degraded and less noisy authentication channels, a single auxiliary random variable is sufficient to express the capacity regions. As specific examples, we use the expressions with one auxiliary random variable to derive the computable forms for binary and Gaussian sources. Numerical calculations for the Gaussian case show the trade-off between secret-key and privacy-leakage rates under a given storage rate, which illustrates how the noise in the enrollment phase affects the capacity region.", "subitem_description_type": "Abstract"}]}, "item_2_publisher_35": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "Institute of Electrical and Electronics Engineers"}]}, "item_2_relation_13": {"attribute_name": "DOI", "attribute_value_mlt": [{"subitem_relation_type": "isIdenticalTo", "subitem_relation_type_id": {"subitem_relation_type_id_text": "https://doi.org/10.1109/TIFS.2023.3307976", "subitem_relation_type_select": "DOI"}}]}, "item_2_source_id_11": {"attribute_name": "書誌レコードID", "attribute_value_mlt": [{"subitem_source_identifier": "AA12122678", "subitem_source_identifier_type": "NCID"}]}, "item_2_source_id_9": {"attribute_name": "ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "1556-6021", "subitem_source_identifier_type": "ISSN"}]}, "item_access_right": {"attribute_name": "アクセス権", "attribute_value_mlt": [{"subitem_access_right": "open access", "subitem_access_right_uri": "http://purl.org/coar/access_right/c_abf2"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorAffiliations": [{"affiliationNames": [{"affiliationName": "Department of Electrical and Computer Engineering, Yokohama National University"}]}], "creatorNames": [{"creatorName": "Vamoua, Yachongka"}]}, {"creatorAffiliations": [{"affiliationNames": [{"affiliationName": "Department of Electrical and Computer Engineering, Yokohama National University"}]}], "creatorNames": [{"creatorName": "Hideki, Yagi"}]}, {"creatorAffiliations": [{"affiliationNames": [{"affiliationName": "Department of Computer and Network Engineering, The University of Electro-Communications"}]}], "creatorNames": [{"creatorName": "Hideki, Ochiai"}], "nameIdentifiers": [{"nameIdentifier": "20334576", "nameIdentifierScheme": "e-Rad", "nameIdentifierURI": "https://kaken.nii.ac.jp/ja/search/?qm=20334576"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2023-09-19"}], "download_preview_message": "", "file_order": 0, "filename": "10227340.pdf", "filesize": [{"value": "9.8 MB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_0", "mimetype": "application/pdf", "size": 9800000.0, "url": {"url": "https://ynu.repo.nii.ac.jp/record/2000037/files/10227340.pdf"}, "version_id": "b775f540-da14-46f1-8f51-572e5ce0cf06"}]}, "item_keyword": {"attribute_name": "キーワード", "attribute_value_mlt": [{"subitem_subject": "Authentication, Random variables, Noise measurement, Object recognition, Databases, Decoding, Biological system modeling, Secret-key agreement, physical identifiers, degraded and less noisy channels, binary and Gaussian sources"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_title": "Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels", "subitem_title_language": "en"}]}, "item_type_id": "2", "owner": "17", "path": ["496"], "permalink_uri": "http://hdl.handle.net/10131/0002000037", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2023-09-19"}, "publish_date": "2023-09-19", "publish_status": "0", "recid": "2000037", "relation": {}, "relation_version_is_last": true, "title": ["Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels"], "weko_shared_id": -1}
  1. 05 工学研究院・理工学府・理工学部
  2. 5-1 学術雑誌論文

Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels

http://hdl.handle.net/10131/0002000037
http://hdl.handle.net/10131/0002000037
e6092db5-12e0-4b83-9b93-614904b643a6
名前 / ファイル ライセンス アクション
10227340.pdf 10227340.pdf (9.8 MB)
license.icon
Item type 学術雑誌論文 / Journal Article(1)
公開日 2023-09-19
タイトル
言語 en
タイトル Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels
言語
言語 eng
キーワード
主題 Authentication, Random variables, Noise measurement, Object recognition, Databases, Decoding, Biological system modeling, Secret-key agreement, physical identifiers, degraded and less noisy channels, binary and Gaussian sources
資源タイプ
資源タイプ識別子 http://purl.org/coar/resource_type/c_6501
資源タイプ journal article
アクセス権
アクセス権 open access
アクセス権URI http://purl.org/coar/access_right/c_abf2
著者 Vamoua, Yachongka

× Vamoua, Yachongka

Vamoua, Yachongka
Department of Electrical and Computer Engineering, Yokohama National University

Search repository
Hideki, Yagi

× Hideki, Yagi

Hideki, Yagi
Department of Electrical and Computer Engineering, Yokohama National University

Search repository
Hideki, Ochiai

× Hideki, Ochiai

e-Rad 20334576

Hideki, Ochiai
Department of Computer and Network Engineering, The University of Electro-Communications

Search repository
抄録
内容記述タイプ Abstract
内容記述 Secret-key agreement using physical identifiers is a promising security protocol for the authentication of users and devices with small chips, owing to its lightweight security. In the previous studies, the fundamental limits of such a protocol were analyzed, and the results showed that two auxiliary random variables were involved in the capacity region expressions. However, with two auxiliary random variables, it is difficult to directly apply the expressions to derive the computable forms of the capacity regions for certain information sources such as binary and Gaussian sources, which hold importance in practical applications. In this paper, we explore the structure of authentication channels and reveal that for the classes of degraded and less noisy authentication channels, a single auxiliary random variable is sufficient to express the capacity regions. As specific examples, we use the expressions with one auxiliary random variable to derive the computable forms for binary and Gaussian sources. Numerical calculations for the Gaussian case show the trade-off between secret-key and privacy-leakage rates under a given storage rate, which illustrates how the noise in the enrollment phase affects the capacity region.
書誌情報 IEEE Transactions on Information Forensics and Security

巻 18, p. 5316-5331, 発行日 2023-08-23
ISSN
収録物識別子タイプ ISSN
収録物識別子 1556-6021
書誌レコードID
収録物識別子タイプ NCID
収録物識別子 AA12122678
DOI
関連タイプ isIdenticalTo
識別子タイプ DOI
関連識別子 https://doi.org/10.1109/TIFS.2023.3307976
出版者
出版者 Institute of Electrical and Electronics Engineers
戻る
0
views
See details
Views

Versions

Ver.1 2023-09-19 01:46:02.493003
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by WEKO3


Powered by WEKO3