首页> 外文会议>IEEE Information Theory Workshop >Private Authentication: Optimal Information Theoretic Schemes
【24h】

Private Authentication: Optimal Information Theoretic Schemes

机译:私人身份验证:最优信息理论方案

获取原文

摘要

The main security service in the connected world of cyber physical systems necessitates to authenticate a large number of nodes privately. In this paper, the private authentication problem is considered, that consists of a certificate authority, a verifier, many legitimate users (prover) and any arbitrary number of illegitimate users. Each legitimate user wants to be authenticated (using his personal key) by the verifier, while simultaneously wants to stay completely anonymous (even to the verifier and the CA). On the other hand, an illegitimate user must fail to authenticate himself. We analyze this problem from an information theoretical perspective. First, we propose a general interactive information-theoretic model for the problem. As a metric to measure the reliability, we consider the authentication key rate whose rate maximization has a trade-off with establishing privacy. Then, we analyze the problem in two different regimes: finite size regime (i.e., the variables are elements of a finite field) and asymptotic regime (i.e., the variables are considered to have large enough length). For both regimes, we propose schemes that satisfy the completeness, soundness and privacy properties. In finite size regime, the idea is to generate the authentication keys according to a secret sharing scheme. In asymptotic regime, we use a random binning based scheme which relies on the joint typicality to generate the authentication keys. Moreover, providing the converse proof, we show that our scheme achieves capacity in the asymptotic regime. For finite size regime our scheme achieves capacity for large field size.
机译:Cyber​​ Mobaly Systems的连接世界中的主要安全服务需要私下验证大量节点。在本文中,考虑了私人身份验证问题,包括证书颁发机构,验证者,许多合法用户(谚语)和任何任意数量的非法用户。每个合法的用户都希望通过验证者进行身份验证(使用他的个人密钥),同时希望保持完全匿名(甚至是验证者和CA)。另一方面,非法用户必须无法验证自己。我们从信息理论角度分析了这个问题。首先,我们提出了一个关于问题的一般互动信息理论模型。作为测量可靠性的指标,我们考虑了速率最大化具有折衷的身份验证键速率,并建立隐私。然后,我们分析了两个不同的制度中的问题:有限尺寸方案(即,变量是有限场的元素)和渐近状态(即,变量被认为具有足够大的变量)。对于这两个制度,我们提出了满足完整性,健全和隐私权的计划。在有限尺寸方案中,该想法是根据秘密共享方案生成身份验证密钥。在渐近制度中,我们使用基于随机的基于融合的方案,依赖于关节典型程度来生成认证密钥。此外,提供匡威证明,我们表明我们的计划能够实现渐近制度的能力。对于有限尺寸制度,我们的计划实现了大场尺寸的能力。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号