An overview of information-theoretic security and privacy: Metrics, limits and applications
This tutorial reviews fundamental contributions to information security. An integrative
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
viewpoint is taken that explains the security metrics, including secrecy, privacy, and others …
Polar coding for secret-key generation
Practical implementations of secret-key generation are often based on sequential strategies,
which handle reliability and secrecy in two successive steps, called reconciliation and …
which handle reliability and secrecy in two successive steps, called reconciliation and …
Secure integrated sensing and communication
This work considers the problem of mitigating information leakage between communication
and sensing in systems jointly performing both operations. Specifically, a discrete …
and sensing in systems jointly performing both operations. Specifically, a discrete …
Information reconciliation schemes in physical-layer security: A survey
Abstract Information reconciliation is an essential part of physical-layer based key
agreement. It enables the equalization of similar, but disagreeing channel observations of …
agreement. It enables the equalization of similar, but disagreeing channel observations of …
Communication for generating correlation: A unifying survey
The task of manipulating correlated random variables in a distributed setting has received
attention in the fields of both Information Theory and Computer Science. Often shared …
attention in the fields of both Information Theory and Computer Science. Often shared …
Code constructions for physical unclonable functions and biometric secrecy systems
The two-terminal key agreement problem with biometric or physical identifiers is considered.
Two linear code constructions based on Wyner-Ziv coding are developed. The first …
Two linear code constructions based on Wyner-Ziv coding are developed. The first …
Privacy, secrecy, and storage with multiple noisy measurements of identifiers
The key-leakage-storage region is derived for a generalization of a classic two-terminal key
agreement model. The additions to the model are that the encoder observes a hidden, or …
agreement model. The additions to the model are that the encoder observes a hidden, or …
Key agreement with physical unclonable functions and biometric identifiers
O Gunlu - Cryptology ePrint Archive, 2021 - eprint.iacr.org
This thesis addresses security and privacy problems for digital devices and biometrics,
where a secret key is generated for authentication, identification, or secure computations. A …
where a secret key is generated for authentication, identification, or secure computations. A …
Secure joint communication and sensing
This work considers mitigation of information leakage between communication and sensing
operations in joint communication and sensing systems. Specifically, a discrete memoryless …
operations in joint communication and sensing systems. Specifically, a discrete memoryless …
Secret-key agreement by asynchronous EEG over authenticated public channels
In this paper, we propose a new system for a sequential secret key agreement based on 6
performance metrics derived from asynchronously recorded EEG signals using an EMOTIV …
performance metrics derived from asynchronously recorded EEG signals using an EMOTIV …