{"title":"Robust secure storage of data sources with perfect secrecy","authors":"Sebastian Baur, H. Boche","doi":"10.1109/WIFS.2017.8267669","DOIUrl":null,"url":null,"abstract":"We consider a secure storage process, that makes use of a biometrie source or a physical unclonable function (PUF) source respectively, from an information theoretic point of view. We consider the storage of the output of a data source that is not necessarily uniformly distributed. We compare different definitions of achievability for the storage model and derive the corresponding capacity region when perfect secrecy is required. The model is generalized to a compound model, taking into account PUF source uncertainty. We also derive the capacity region for the compound storage model requiring perfect secrecy.","PeriodicalId":305837,"journal":{"name":"2017 IEEE Workshop on Information Forensics and Security (WIFS)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE Workshop on Information Forensics and Security (WIFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WIFS.2017.8267669","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
We consider a secure storage process, that makes use of a biometrie source or a physical unclonable function (PUF) source respectively, from an information theoretic point of view. We consider the storage of the output of a data source that is not necessarily uniformly distributed. We compare different definitions of achievability for the storage model and derive the corresponding capacity region when perfect secrecy is required. The model is generalized to a compound model, taking into account PUF source uncertainty. We also derive the capacity region for the compound storage model requiring perfect secrecy.