Papers
Topics
Authors
Recent
Search
2000 character limit reached

Secret Key-based Authentication With Passive Eavesdropper for Scalar Gaussian Sources

Published 21 Feb 2022 in cs.IT, cs.CR, and math.IT | (2202.10018v2)

Abstract: We analyze the fundamental trade-off of secret key-based authentication systems in the presence of an eavesdropper for correlated Gaussian sources. A complete characterization of trade-off among secret-key, storage, and privacy-leakage rates of both generated and chosen secret models is provided. One of the main contributions is revealing that unlike the known results for discrete sources, there is no need for the second auxiliary random variable in characterizing the capacity regions for the Gaussian cases. In addition, it is shown that the strong secrecy for secrecy-leakage of the systems can be achieved by an information-spectrum approach, and the parametric expressions (computable forms) of the capacity regions are also derived.

Citations (7)

Summary

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.