Authentication based on secret-key generation

F.M.J. Willems, T. Ignatenko

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

8 Citaten (Scopus)
13 Downloads (Pure)

Samenvatting

We present models for authentication in biometric settings. We could determine the trade-off between false-acceptance exponents and the so-called privacy-leakage rate. In this way we extend the Ahlswede-Csiszar secret-key generation result [1993] and more specifically the secret-key rate vs. privacy-leakage rate trade-off, studied by Ignatenko and Willems [2009].
Originele taal-2Engels
TitelProceedings of International Symposium on Information Theory (ISIT), 1-6 July 2012, Cambridge, MA, USA
Plaats van productiePiscataway
UitgeverijInstitute of Electrical and Electronics Engineers
Pagina's1792-1796
ISBN van geprinte versie978-1-4673-2580-6
DOI's
StatusGepubliceerd - 2012

Vingerafdruk Duik in de onderzoeksthema's van 'Authentication based on secret-key generation'. Samen vormen ze een unieke vingerafdruk.

  • Citeer dit

    Willems, F. M. J., & Ignatenko, T. (2012). Authentication based on secret-key generation. In Proceedings of International Symposium on Information Theory (ISIT), 1-6 July 2012, Cambridge, MA, USA (blz. 1792-1796). Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/ISIT.2012.6283587