Loading...
Private authentication: optimal information theoretic schemes
Kazempour, N ; Sharif University of Technology | 2019
315
Viewed
- Type of Document: Article
- DOI: 10.1109/ITW44776.2019.8989293
- Publisher: Institute of Electrical and Electronics Engineers Inc , 2019
- Abstract:
- The main security service in the connected world of cyber physical systems necessitates to authenticate a large number of nodes privately. In this paper, the private authentication problem is considered, that consists of a certificate authority, a verifier, many legitimate users (prover) and any arbitrary number of illegitimate users. Each legitimate user wants to be authenticated (using his personal key) by the verifier, while simultaneously wants to stay completely anonymous (even to the verifier and the CA). On the other hand, an illegitimate user must fail to authenticate himself. We analyze this problem from an information theoretical perspective. First, we propose a general interactive information-theoretic model for the problem. As a metric to measure the reliability, we consider the authentication key rate whose rate maximization has a trade-off with establishing privacy. Then, we analyze the problem in two different regimes: Finite size regime (i.e., the variables are elements of a finite field) and asymptotic regime (i.e., the variables are considered to have large enough length). For both regimes, we propose schemes that satisfy the completeness, soundness and privacy properties. In finite size regime, the idea is to generate the authentication keys according to a secret sharing scheme. In asymptotic regime, we use a random binning based scheme which relies on the joint typicality to generate the authentication keys. Moreover, providing the converse proof, we show that our scheme achieves capacity in the asymptotic regime. For finite size regime our scheme achieves capacity for large field size. © 2019 IEEE
- Keywords:
- Economic and social effects ; Embedded systems ; Information theory ; Arbitrary number ; Asymptotic regimes ; Certificate authority ; Interactive informations ; Joint typicalities ; Private authentication ; Secret sharing schemes ; Security services ; Authentication
- Source: 2019 IEEE Information Theory Workshop, ITW 2019, 25 August 2019 through 28 August 2019 ; 2019 ; 9781538669006 (ISBN)
- URL: https://ieeexplore.ieee.org/document/8989293