Privacy, Secrecy, and Storage with Noisy Identifiers
نویسندگان
چکیده
The key-leakage-storage capacity regions for a hidden identifier’s noisy measurements at two terminals of a secrecy system are derived. The capacity regions of binary sources with multiple measurements are obtained by applying Mrs. Gerber’s lemma twice in different directions to a Markov chain to show gains in privacy-leakage as compared to assuming a noise-free identifier at the encoder.
منابع مشابه
Comparing General Paradigms on Data Secrecy Protection for Outsourced Files in Mobile Cloud Computing
The data secrecy of outsourced files in cloud server should be protected even though cloud servers are untrustworthy. In this paper, we extensively analyze the techniques on data privacy protection for secure cloud storage. We propose and compare several general paradigms on data secrecy protection including ID-based scheme, CLPKCbased scheme, key-escrow-based scheme, ID-based threshold decrypt...
متن کاملRFID Ownership Transfer with Positive Secrecy Capacity Channels
RFID ownership transfer protocols (OTPs) transfer tag ownership rights. Recently, there has been considerable interest in such protocols; however, guaranteeing privacy for symmetric-key settings without trusted third parties (TTPs) is a challenge still unresolved. In this paper, we address this issue and show that it can be solved by using channels with positive secrecy capacity. We implement t...
متن کاملWyner-Ziv Coding for Physical Unclonable Functions and Biometric Secrecy Systems
Two constructive linear coding methods, previously proposed for the Wyner-Ziv problem, are developed to achieve all points of the key-leakage-storage regions of the generatedand chosen-secret models of biometric secrecy systems. The models also apply to physical unclonable functions that are realized by fine hardware variations. The linear coding is implemented by using nested polar codes and t...
متن کاملارایه یک روش جدید انتشار دادهها با حفظ محرمانگی با هدف بهبود دقّت طبقهبندی روی دادههای گمنام
Data collection and storage has been facilitated by the growth in electronic services, and has led to recording vast amounts of personal information in public and private organizations databases. These records often include sensitive personal information (such as income and diseases) and must be covered from others access. But in some cases, mining the data and extraction of knowledge from thes...
متن کاملSecurity and Privacy Challenges in Large-Scale Cloud Computing using Signature Generation Algorithm
In this paper, the secure data storage in clouds for a new decentralized access is proposed. Concerns like data leakage are common and can influence the original data owners drastically. Encrypting every data over the cloud which is a huge collection of data is not economically feasible. Signature Generation Algorithm (SGA) is proposed to authenticate the data access from the cloud to ensure th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1601.06756 شماره
صفحات -
تاریخ انتشار 2016