Privacy, Secrecy, and Storage with Noisy Identifiers

نویسندگان

  • Onur Günlü
  • Gerhard Kramer
چکیده

The key-leakage-storage capacity regions for a hidden identifier’s noisy measurements at two terminals of a secrecy system are derived. The capacity regions of binary sources with multiple measurements are obtained by applying Mrs. Gerber’s lemma twice in different directions to a Markov chain to show gains in privacy-leakage as compared to assuming a noise-free identifier at the encoder.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparing General Paradigms on Data Secrecy Protection for Outsourced Files in Mobile Cloud Computing

The data secrecy of outsourced files in cloud server should be protected even though cloud servers are untrustworthy. In this paper, we extensively analyze the techniques on data privacy protection for secure cloud storage. We propose and compare several general paradigms on data secrecy protection including ID-based scheme, CLPKCbased scheme, key-escrow-based scheme, ID-based threshold decrypt...

متن کامل

RFID Ownership Transfer with Positive Secrecy Capacity Channels

RFID ownership transfer protocols (OTPs) transfer tag ownership rights. Recently, there has been considerable interest in such protocols; however, guaranteeing privacy for symmetric-key settings without trusted third parties (TTPs) is a challenge still unresolved. In this paper, we address this issue and show that it can be solved by using channels with positive secrecy capacity. We implement t...

متن کامل

Wyner-Ziv Coding for Physical Unclonable Functions and Biometric Secrecy Systems

Two constructive linear coding methods, previously proposed for the Wyner-Ziv problem, are developed to achieve all points of the key-leakage-storage regions of the generatedand chosen-secret models of biometric secrecy systems. The models also apply to physical unclonable functions that are realized by fine hardware variations. The linear coding is implemented by using nested polar codes and t...

متن کامل

ارایه یک روش جدید انتشار داده‌ها با حفظ محرمانگی با هدف بهبود دقّت طبقه‌‌بندی روی داده‌های گمنام

Data collection and storage has been facilitated by the growth in electronic services, and has led to recording vast amounts of personal information in public and private organizations databases. These records often include sensitive personal information (such as income and diseases) and must be covered from others access. But in some cases, mining the data and extraction of knowledge from thes...

متن کامل

Security and Privacy Challenges in Large-Scale Cloud Computing using Signature Generation Algorithm

In this paper, the secure data storage in clouds for a new decentralized access is proposed. Concerns like data leakage are common and can influence the original data owners drastically. Encrypting every data over the cloud which is a huge collection of data is not economically feasible. Signature Generation Algorithm (SGA) is proposed to authenticate the data access from the cloud to ensure th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1601.06756  شماره 

صفحات  -

تاریخ انتشار 2016