WEKO3
アイテム
{"_buckets": {"deposit": "022341a1-48f6-492a-a035-cbc252cc2394"}, "_deposit": {"created_by": 17, "id": "2000037", "owner": "17", "owners": [17], "owners_ext": {"displayname": "横浜国立大学附属図書館", "username": "yokokoku"}, "pid": {"revision_id": 0, "type": "depid", "value": "2000037"}, "status": "published"}, "_oai": {"id": "oai:ynu.repo.nii.ac.jp:02000037", "sets": ["496"]}, "author_link": [], "control_number": "2000037", "item_2_biblio_info_8": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2023-08-23", "bibliographicIssueDateType": "Issued"}, "bibliographicPageEnd": "5331", "bibliographicPageStart": "5316", "bibliographicVolumeNumber": "18", "bibliographic_titles": [{"bibliographic_title": "IEEE Transactions on Information Forensics and Security"}]}]}, "item_2_description_5": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "Secret-key agreement using physical identifiers is a promising security protocol for the authentication of users and devices with small chips, owing to its lightweight security. In the previous studies, the fundamental limits of such a protocol were analyzed, and the results showed that two auxiliary random variables were involved in the capacity region expressions. However, with two auxiliary random variables, it is difficult to directly apply the expressions to derive the computable forms of the capacity regions for certain information sources such as binary and Gaussian sources, which hold importance in practical applications. In this paper, we explore the structure of authentication channels and reveal that for the classes of degraded and less noisy authentication channels, a single auxiliary random variable is sufficient to express the capacity regions. As specific examples, we use the expressions with one auxiliary random variable to derive the computable forms for binary and Gaussian sources. Numerical calculations for the Gaussian case show the trade-off between secret-key and privacy-leakage rates under a given storage rate, which illustrates how the noise in the enrollment phase affects the capacity region.", "subitem_description_type": "Abstract"}]}, "item_2_publisher_35": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "Institute of Electrical and Electronics Engineers"}]}, "item_2_relation_13": {"attribute_name": "DOI", "attribute_value_mlt": [{"subitem_relation_type": "isIdenticalTo", "subitem_relation_type_id": {"subitem_relation_type_id_text": "https://doi.org/10.1109/TIFS.2023.3307976", "subitem_relation_type_select": "DOI"}}]}, "item_2_source_id_11": {"attribute_name": "書誌レコードID", "attribute_value_mlt": [{"subitem_source_identifier": "AA12122678", "subitem_source_identifier_type": "NCID"}]}, "item_2_source_id_9": {"attribute_name": "ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "1556-6021", "subitem_source_identifier_type": "ISSN"}]}, "item_access_right": {"attribute_name": "アクセス権", "attribute_value_mlt": [{"subitem_access_right": "open access", "subitem_access_right_uri": "http://purl.org/coar/access_right/c_abf2"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorAffiliations": [{"affiliationNames": [{"affiliationName": "Department of Electrical and Computer Engineering, Yokohama National University"}]}], "creatorNames": [{"creatorName": "Vamoua, Yachongka"}]}, {"creatorAffiliations": [{"affiliationNames": [{"affiliationName": "Department of Electrical and Computer Engineering, Yokohama National University"}]}], "creatorNames": [{"creatorName": "Hideki, Yagi"}]}, {"creatorAffiliations": [{"affiliationNames": [{"affiliationName": "Department of Computer and Network Engineering, The University of Electro-Communications"}]}], "creatorNames": [{"creatorName": "Hideki, Ochiai"}], "nameIdentifiers": [{"nameIdentifier": "20334576", "nameIdentifierScheme": "e-Rad", "nameIdentifierURI": "https://kaken.nii.ac.jp/ja/search/?qm=20334576"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2023-09-19"}], "download_preview_message": "", "file_order": 0, "filename": "10227340.pdf", "filesize": [{"value": "9.8 MB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_0", "mimetype": "application/pdf", "size": 9800000.0, "url": {"url": "https://ynu.repo.nii.ac.jp/record/2000037/files/10227340.pdf"}, "version_id": "b775f540-da14-46f1-8f51-572e5ce0cf06"}]}, "item_keyword": {"attribute_name": "キーワード", "attribute_value_mlt": [{"subitem_subject": "Authentication, Random variables, Noise measurement, Object recognition, Databases, Decoding, Biological system modeling, Secret-key agreement, physical identifiers, degraded and less noisy channels, binary and Gaussian sources"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_title": "Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels", "subitem_title_language": "en"}]}, "item_type_id": "2", "owner": "17", "path": ["496"], "permalink_uri": "http://hdl.handle.net/10131/0002000037", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2023-09-19"}, "publish_date": "2023-09-19", "publish_status": "0", "recid": "2000037", "relation": {}, "relation_version_is_last": true, "title": ["Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels"], "weko_shared_id": -1}
Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels
http://hdl.handle.net/10131/0002000037
http://hdl.handle.net/10131/0002000037e6092db5-12e0-4b83-9b93-614904b643a6
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
Item type | 学術雑誌論文 / Journal Article(1) | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
公開日 | 2023-09-19 | |||||||||||
タイトル | ||||||||||||
言語 | en | |||||||||||
タイトル | Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels | |||||||||||
言語 | ||||||||||||
言語 | eng | |||||||||||
キーワード | ||||||||||||
主題 | Authentication, Random variables, Noise measurement, Object recognition, Databases, Decoding, Biological system modeling, Secret-key agreement, physical identifiers, degraded and less noisy channels, binary and Gaussian sources | |||||||||||
資源タイプ | ||||||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||||||
資源タイプ | journal article | |||||||||||
アクセス権 | ||||||||||||
アクセス権 | open access | |||||||||||
アクセス権URI | http://purl.org/coar/access_right/c_abf2 | |||||||||||
著者 |
Vamoua, Yachongka
× Vamoua, Yachongka
× Hideki, Yagi
× Hideki, Ochiai
e-Rad
20334576
|
|||||||||||
抄録 | ||||||||||||
内容記述タイプ | Abstract | |||||||||||
内容記述 | Secret-key agreement using physical identifiers is a promising security protocol for the authentication of users and devices with small chips, owing to its lightweight security. In the previous studies, the fundamental limits of such a protocol were analyzed, and the results showed that two auxiliary random variables were involved in the capacity region expressions. However, with two auxiliary random variables, it is difficult to directly apply the expressions to derive the computable forms of the capacity regions for certain information sources such as binary and Gaussian sources, which hold importance in practical applications. In this paper, we explore the structure of authentication channels and reveal that for the classes of degraded and less noisy authentication channels, a single auxiliary random variable is sufficient to express the capacity regions. As specific examples, we use the expressions with one auxiliary random variable to derive the computable forms for binary and Gaussian sources. Numerical calculations for the Gaussian case show the trade-off between secret-key and privacy-leakage rates under a given storage rate, which illustrates how the noise in the enrollment phase affects the capacity region. | |||||||||||
書誌情報 |
IEEE Transactions on Information Forensics and Security 巻 18, p. 5316-5331, 発行日 2023-08-23 |
|||||||||||
ISSN | ||||||||||||
収録物識別子タイプ | ISSN | |||||||||||
収録物識別子 | 1556-6021 | |||||||||||
書誌レコードID | ||||||||||||
収録物識別子タイプ | NCID | |||||||||||
収録物識別子 | AA12122678 | |||||||||||
DOI | ||||||||||||
関連タイプ | isIdenticalTo | |||||||||||
識別子タイプ | DOI | |||||||||||
関連識別子 | https://doi.org/10.1109/TIFS.2023.3307976 | |||||||||||
出版者 | ||||||||||||
出版者 | Institute of Electrical and Electronics Engineers |