Biometric Systems with Multiuser Access Structures

被引:0
作者
Chou, Remi A. [1 ]
机构
[1] Wichita State Univ, Dept Elect Engn & Comp Sci, Wichita, KS 67260 USA
来源
2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT) | 2019年
关键词
AUTHENTICATION; PRIVACY; SECURITY; SECRECY;
D O I
10.1109/isit.2019.8849439
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a model for biometric systems with a multiuser access structure, where after enrollment only pre-defined authorized sets of participants are allowed to access the system upon presenting their biometrics. Two types of system design are considered for the enrollment. In the first one, the participants must simultaneously present their biometrics to enroll in the system. In the second one, each participant can individually enroll in the system, which is more convenient for systems with a large number of participants. For these two types of enrollment and the presence of a multiuser access structure, the fundamental trade-off between security and privacy leakage is studied.
引用
收藏
页码:807 / 811
页数:5
相关论文
共 23 条
  • [1] [Anonymous], 2005, Biometric systems: technology, design, and performance evaluation
  • [2] Source Polarization
    Arikan, Erdal
    [J]. 2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, : 899 - 903
  • [3] Chou R., 2019, IEEE T INF THEORY
  • [4] Polar Coding for the Broadcast Channel With Confidential Messages: A Random Binning Analogy
    Chou, Remi A.
    Bloch, Matthieu R.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (05) : 2410 - 2429
  • [5] Polar Coding for Secret-Key Generation
    Chou, Remi A.
    Bloch, Matthieu R.
    Abbe, Emmanuel
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (11) : 6213 - 6237
  • [6] Separation of Reliability and Secrecy in Rate-Limited Secret-Key Generation
    Chou, Remi A.
    Bloch, Matthieu R.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (08) : 4941 - 4957
  • [7] Csiszar I., 1996, Problems of Information Transmission, V32, P40
  • [8] Common randomness and secret key generation with a helper
    Csiszár, I
    Narayan, P
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (02) : 344 - 366
  • [9] Csiszar I., 1981, Information theory: coding theorems for discrete memoryless systems
  • [10] Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523