• DocumentCode
    1975486
  • Title

    On information leakage during secure verification of compatibility between signals

  • Author

    Sun, Wei ; Rane, Shantanu

  • Author_Institution
    Mitsubishi Electr. Res. Labs., Cambridge, MA
  • fYear
    2009
  • fDate
    13-15 May 2009
  • Firstpage
    75
  • Lastpage
    78
  • Abstract
    We consider a secure verification problem in which Alice wants to verify whether her signal Xn is compatible with Bob´s signal Yn, where Xn and Yn are drawn i.i.d. according to a joint distribution p(x, y). The notion of compatibility is defined as the requirement that p(x, y) belongs to a certain set A of allowable joint distributions. For privacy, Alice jointly encrypts and encodes Xn and transmits the result over a public channel to Bob. Using the information leaked by the encryption algorithm, Bob verifies the compatiblility of Xn with Yn. We characterize the minimum information that Alice´s encryption and coding algorithm must leak in order to guarantee reliable verification results. Further, we determine the maximum information that Bob can hope to extract about Xn if he is curious. It is shown that a source/channel separation theorem holds for this scenario.
  • Keywords
    cryptography; data privacy; signal processing; coding algorithm; compatibility verification security; encryption algorithm; information leakage; secure verification problem; source-channel separation theorem; Application software; Authentication; Cryptography; Data mining; Distortion; Fingerprint recognition; Privacy; Probability distribution; Signal processing; Sun; Encryption; Secure Classification; Slepian-Wolf coding; Types;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Theory, 2009. CWIT 2009. 11th Canadian Workshop on
  • Conference_Location
    Ottawa, ON
  • Print_ISBN
    978-1-4244-3400-8
  • Electronic_ISBN
    978-1-4244-3401-5
  • Type

    conf

  • DOI
    10.1109/CWIT.2009.5069525
  • Filename
    5069525