首页> 外文会议>IEEE Information Theory Workshop >Private Authentication: Optimal Information Theoretic Schemes
【24h】

Private Authentication: Optimal Information Theoretic Schemes

机译:私人认证:最佳信息理论方案

获取原文

摘要

The main security service in the connected world of cyber physical systems necessitates to authenticate a large number of nodes privately. In this paper, the private authentication problem is considered, that consists of a certificate authority, a verifier, many legitimate users (prover) and any arbitrary number of illegitimate users. Each legitimate user wants to be authenticated (using his personal key) by the verifier, while simultaneously wants to stay completely anonymous (even to the verifier and the CA). On the other hand, an illegitimate user must fail to authenticate himself. We analyze this problem from an information theoretical perspective. First, we propose a general interactive information-theoretic model for the problem. As a metric to measure the reliability, we consider the authentication key rate whose rate maximization has a trade-off with establishing privacy. Then, we analyze the problem in two different regimes: finite size regime (i.e., the variables are elements of a finite field) and asymptotic regime (i.e., the variables are considered to have large enough length). For both regimes, we propose schemes that satisfy the completeness, soundness and privacy properties. In finite size regime, the idea is to generate the authentication keys according to a secret sharing scheme. In asymptotic regime, we use a random binning based scheme which relies on the joint typicality to generate the authentication keys. Moreover, providing the converse proof, we show that our scheme achieves capacity in the asymptotic regime. For finite size regime our scheme achieves capacity for large field size.
机译:网络物理系统的互联世界中的主要安全服务需要私下认证大量节点。在本文中,考虑了专用认证问题,它由证书颁发机构,验证者,许多合法用户(提供者)和任意数量的非法用户组成。每个合法用户都希望由验证者进行身份验证(使用其个人密钥),而同时又希望保持完全匿名(甚至对验证者和CA也是如此)。另一方面,非法用户必须无法对其进行身份验证。我们从信息理论的角度分析此问题。首先,我们针对该问题提出了一种通用的交互式信息理论模型。作为衡量可靠性的指标,我们考虑身份验证密钥速率,该速率的最大化需要与建立私密性进行权衡。然后,我们用两种不同的方式分析问题:有限大小方式(即变量是有限域的元素)和渐近方式(即变量被认为具有足够的长度)。对于这两种方案,我们提出了满足完整性,稳健性和隐私性的方案。在有限大小的情况下,其思想是根据秘密共享方案生成身份验证密钥。在渐近状态下,我们使用基于联合的典型性的基于随机分箱的方案来生成认证密钥。此外,提供相反的证明,我们表明我们的方案在渐近状态下达到了容量。对于有限大小的方案,我们的方案可实现大字段大小的容量。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号