Multi-Entity and Multi-Enrollment Key Agreement with Correlated Noise
Abstract
A basic model for key agreement with a remote (or hidden) source is extended to a multi-user model with joint secrecy and privacy constraints over all entities that do not trust each other after key agreement. Multiple entities using different measurements of the same source through broadcast channels (BCs) to agree on mutually-independent local secret keys are considered. Our model is the proper multi-user extension of the basic model since the encoder and decoder pairs are not assumed to trust other pairs after key agreement, unlike assumed in the literature. Strong secrecy constraints imposed on all secret keys jointly, which is more stringent than separate secrecy leakage constraints for each secret key considered in the literature, are satisfied. Inner bounds for maximum key rate, and minimum privacy-leakage and database-storage rates are proposed for any finite number of entities. Inner and outer bounds for degraded and less-noisy BCs are given to illustrate cases with strong privacy. A multi-enrollment model that is used for common physical unclonable functions is also considered to establish inner and outer bounds for key-leakage-storage regions that differ only in the Markov chains imposed. For this special case, the encoder and decoder measurement channels have the same channel transition matrix and secrecy leakage is measured for each secret key separately. We illustrate cases for which it is useful to have multiple enrollments as compared to a single enrollment and vice versa.
Index Terms:
Information theoretic privacy, multiple enrollments, multiple entities, physical unclonable functions.I Introduction
A natural source of randomness is biometric identifiers such as fingerprints that are generally transformed into a frequency domain and quantized to obtain bit sequences that are unique to an individual [1]. Similarly, physical identifiers such as fine variations of ring oscillator (RO) outputs or random start-up values of static random access memories (SRAMs) that are caused by uncontrollable manufacturing variations, are safer and cheaper alternatives to key storage in a non-volatile memory [2]. Physical identifiers for digital devices such as Internet-of-Things (IoT) devices can be implemented using physical unclonable functions (PUFs) [2]. One can use PUFs in various coding schemes as a source of local randomness [3, Chapter 1], e.g., in the randomized encoder of the wiretap channel [4] and of the strong coordination problem [5, 6].
We use the basic source model for key agreement from [7, 8] to find achievable rate regions for key agreement with PUFs and biometric identifiers. In this classic model, an encoder observes a source output to generate a secret key and sends public side information, i.e., helper data, to a decoder, so the decoder can reliably reconstruct the same secret key by observing another source output and the helper data. The main constraints are that the information leaked about the secret key, i.e., secrecy leakage, is negligible and the information leaked about the identifier output, i.e., privacy leakage, is small [9, 10]. Furthermore, the amount of public storage should also be minimized to limit the hardware cost [11].
Suppose the encoder generates a key from a noisy measurement of a hidden (or remote) source output, and a decoder has access to another noisy measurement of the same source and the helper data to reconstruct the same key. We call this model the generated-secret (GS) model with a hidden source. This model is introduced in [12] as an extension of the visible (noiseless) source outputs observed by the encoder, considered in [9, 10]. Similarly, for the chosen-secret (CS) model, an embedded (or chosen) key and noisy identifier measurements are combined by the encoder to generate the public helper data. We consider both models to address different applications.
I-A Related Work and Motivation
The same identifier is used by multiple encoder and decoder pairs in [13], where the identifier outputs observed by different encoders are the same because the encoder measurements are assumed to be noiseless. Therefore, the multiple use of the same noiseless source output allows all encoders to know the secret key of the other encoders. This model does not fit well to the practical key agreement with identifier scenarios because there is noise in every identifier measurement.
Multiple enrollments of a hidden source using noisy measurements are considered in [14], where weakly secure secret keys are generated without privacy leakage and storage constraints. Furthermore, there is a causality assumption in [14] on the availability of the helper data, i.e., any decoder has access to all previously-generated helper data. This assumption is not necessarily realistic as a decoder of, e.g., an IoT device that embodies a PUF should be low complexity and the amount of data to process increases linearly with the number of enrollments. In addition, any manipulation in any of the helper data can cause the complete multi-enrollment system to fail.
A classic method used for key agreement, i.e., the fuzzy commitment scheme (FCS) [15], is used in [16] in combination with an SRAM PUF to enroll the noisy outputs of the same SRAM multiple times. The symmetry condition in [16, Eq. (16)] conditioned on a fixed SRAM cell state is entirely similar to the symmetry satisfied by binary-input symmetric output (BISO) channels; see e.g., [17, p. 613], [12, Eq. (14)]. For SRAM outputs that satisfy this symmetry, the normalized (weak) secrecy leakage about each separate secret key is shown to be zero. It is discussed in [18, Section 3.4] that any uniformly-distributed hidden identifier output with BISO measurement channels satisfies the results in [16]. In [18, Theorem 1] the secret-key capacity of the two-enrollment key agreement problem is established for measurement channels with the same channel transition matrix. However, these multi-enrollment models do not consider the privacy leakage and storage constraints, there is no constraint on the independence of the secret keys of different enrollments, and the secrecy leakage constraint is weak and is not applied jointly on all secret keys. Furthermore, optimal random linear code constructions that achieve the boundaries of the key-leakage-storage regions are given in [19], where the classic code constructions FCS and code-offset fuzzy extractors [20] are shown to be strictly suboptimal. Therefore, the multi-enrollment models and constructions in the literature are strictly suboptimal and not necessarily realistic. We therefore list stronger secrecy constraints jointly on all entities, which approximates the reality better in combination with storage rate and joint privacy-leakage rate constraints. These constraints define the multi-entity key agreement problem, where the entities that use the same identifier do not have to trust other entities after key agreement. Therefore, the multi-entity key agreement problem is a proper multi-user extension of single-enrollment models. We first consider the multi-entity key agreement problem and then analyze a special case of the multi-enrollment key agreement problem to illustrate scenarios for which a single enrollment can be more useful than multiple enrollments and vice versa.
Every measurement of an identifier is considered to be noisy due to, e.g., local temperature and voltage changes in the hardware of the PUF circuit or a cut on the finger. Noise components at the encoder and decoder measurements of a hidden source can be also correlated due to, e.g., the surrounding logic in the hardware [21] or constant fingertip moisture. This correlation between the noise sequences is modeled in [22] as a broadcast channel (BC) [23] with an input that is the hidden source output and with outputs that are the noisy encoder and decoder measurements. We use this model for multi-entity key agreement with identifiers, where each entity (i.e., each encoder and decoder pair) observes noisy identifier outputs of the same hidden source through different BCs. For the multi-entity key agreement problem, we allow the BCs to be different as honest entities generally use different hardware implementations of the encoder and decoder pairs, which results in different correlations between noise components.
We also consider physically-degraded (PD) and less-noisy (LN) BCs to give finer inner and outer bounds to the key-leakage-storage regions for the GS and CS models of the multi-entity key agreement problem. For the considered PD and LN BCs, we prove that strong privacy can be achieved. In [9, 10, 24], an extra common randomness that is available to the encoder and decoder and that is hidden from the eavesdropper is required to obtain strong privacy. This assumption is not realistic since such a common randomness requires hardware protection against invasive attacks, and if such a protection is feasible, then it is not necessary to use an identifier for key agreement.
I-B Models for Identifier Outputs
We study physical and biometric identifier outputs that are independent and identically distributed (i.i.d.) according to a given probability distribution. These models are reasonable if one uses transform-coding algorithms from [25] that occupy a small hardware area to extract almost i.i.d. bits from PUFs under varying environmental conditions. Similar transform-coding based algorithms have been applied to biometric identifiers to obtain independent output symbols [26]. These transform-coding algorithms provide almost i.i.d. identifier outputs and noise sequences; however, the correlation between the noise components on the encoder and decoder components are not removed using these methods. Furthermore, PUFs are used for on-demand key reconstruction and physical attacks on PUFs permanently change the identifier outputs [27], so we assume that the eavesdropper cannot obtain information correlated with the PUF outputs, unlike biometric identifiers.
I-C Summary of Contributions
We extend the key-leakage-storage rate tuple analysis of the single-enrollment model for hidden identifier outputs measured through general BCs in [22] to consider multi-entity and multi-enrollment key agreement with a set of stringent secrecy constraints. A summary of the main contributions is as follows.
-
•
We derive achievable key-leakage-storage rate tuples for the GS model with strong secrecy for any finite number of entities using the same identifier’s measurements through different BCs for key agreement. Separate identifier measurements considered in [28, 12] correspond to a PD BC and the visible source model in [9, 10] corresponds to a semi-deterministic BC.
-
•
For a set of PD and LN BCs, the privacy-leakage rates for the two-entity key agreement problem are calculated. These PD and LN BCs are shown to provide strong privacy without the need of a common randomness. An outer bound is given for the considered PD and LN BCs.
-
•
We next consider a special case of the multi-enrollment key agreement problem, where all measurement channels are separate (i.e., PD BCs) and they have the same transition matrix. This is a common model used for SRAM PUFs. Using a less stringent secrecy leakage constraint that bounds the information leakage for each secret key separately and without the mutual independence constraint on the secret keys, we establish inner and outer bounds for the strong-secrecy key-leakage-storage region for this two-enrollment key agreement problem. The bounds differ only in the Markov chains imposed. This result is a significant improvement to the two-enrollment secret-key rate region (without storage and privacy-leakage rate constraints) established in [18] for weak secrecy, which is recovered by eliminating auxiliary random variables in the proposed rate regions.
-
•
All inner and outer bounds for the GS model are extended to the CS model, which comprises secret-key binding methods that embed a chosen secret key to the encoder.
-
•
We give two scenarios to compare single-enrollment and two-enrollment models and illustrate that for different assumptions on measurement channels, either of the two models can perform better in terms of the privacy-leakage vs. secret-key rate boundary tuples.
I-D Organization
This paper is organized as follows. In Section II, we describe the multi-entity key agreement problem with BC measurements. We give achievable key-leakage-storage regions for the GS and CS models with strong secrecy and BC measurements for any finite number of entities in Section III in addition to inner and outer bounds for PD and LN BCs that satisfy strong privacy. The proposed inner bounds for the two-enrollment key agreement problem in Section IV are shown to differ from the outer bounds only in the Markov chains imposed for a special case with less stringent secrecy constraints. In Sections V and VI, proofs of the given rate regions for the general multi-entity key agremeent problem and for the two-enrollment key agreement problem, respectively, are given. Section VII concludes the paper.
I-E Notation
Upper case letters represent random variables and lower case letters their realizations. A superscript denotes a string of variables, e.g., , and a subscript denotes the position of a variable in a string. A random variable has probability distribution . Calligraphic letters such as denote sets, set sizes are written as and their complements as . denotes the set for an integer and denotes the set for any . is the binary entropy function, where we take logarithms to the base , and denotes its inverse with range . is a binary random variable with . A binary symmetric channel (BSC) with crossover probability is denoted by BSC(). is the -function that gives the tail probability for the standard normal distribution.
II Multi-Entity Key Agreement Model
Consider hidden identifier outputs that are i.i.d. according to a probability distribution . The hidden (or remote) source with outputs is common to all honest entities that enroll the same identifier, but they observe different noisy measurements of the same hidden source. If there are a finite number of honest entities that use the same identifer, the -th encoder and decoder pair observes noisy source measurements that are outputs of a BC , with abuse of notation, for all , where , , and are finite sets.
For the GS model illustrated in Fig. 1 for honest entities, the -th encoder generates helper data and a secret key from its observed sequence . All secret keys are stored in a secure database, whereas helper data are stored in a public database so that an eavesdropper has access only to the helper data. Using the helper data and its observed sequence , the -th decoder generates the key estimate . Similar steps are applied for the CS model in Fig. 1 also for honest entities, except that each should be embedded into the -th encoder .
Denote a set of secret keys as
(1) |
and a set of helper data as
(2) |
for any . A (secret-key, privacy-leakage, storage), or key-leakage-storage, rate tuple is denoted as . Similarly, we denote a set of secret-key rates, for any , as
(3) |
and a set of storage rates as
(4) |
We next define the multi-entity key-leakage-storage regions.
Definition 1.
A key-leakage-storage rate tuple is achievable for the multi-entity GS and CS models with -th encoder and decoder measurements through a BC if, given any , there is some , and encoder and decoder pairs for which for all and
(reliability) | (5) | |||
(key uniformity) | (6) | |||
(strong key ind.) | (7) | |||
(privacy) | (8) | |||
(strong secrecy) | (9) | |||
(10) |
The multi-entity key-leakage-storage regions for the GS model and for the CS model are the closures of the set of all achievable rate tuples .
Both secret-key uniformity (6) and storage rate (10) constraints correspond to separate constraints. However, reliability (5), strong and mutual key independence (7), privacy-leakage rate (8), and secrecy leakage (9) constraints are joint constraints for all honest entities. Suppose after a key generation, an honest entity has access only to its corresponding secret key and it does not have access to other entities’ keys or sequences or even to the sequence it observed to generate its secret key.
The mutual key independence constraint in (7) is not imposed in the multi-enrollment key agreement problem considered in [16]. Furthermore, a normalized (weak) version of this constraint is imposed in the multi-enrollment key agreement problem considered in [14], where the -th decoder is assumed to have access to the set of helper data for all . The lack of the mutual key independence constraint and the assumption of availability of all previous helper data require that different encoder and decoder pairs should trust each other after key agreement. This can be the case, e.g., if all enrollments are made by the same entity. Therefore, the multi-entity key agreement problem imposes strictly more stringent constraints than the multi-enrollment key agreement problem.
The unnormalized secrecy leakage constraint (9) provides strong secrecy, which is a stronger notion than the weak secrecy considered in [9, 10, 12, 28, 16, 14]. Furthermore, (9) is more stringent than the set of individual secrecy leakage constraints imposed for all , considered in [16] for symmetric SRAM PUF outputs in combination with the suboptimal FCS.
The unnormalized privacy leakage cannot be bounded by a finite number in general. We illustrate special strong privacy cases in the next section.
III Inner Bounds
We are interested in characterizing the optimal trade-off among the secret-key, privacy-leakage, and storage rates with strong secrecy for BC measurements at the encoders and decoders of any finite number of entities that use the same hidden identifier outputs for the multi-entity key agreement problem. We give achievable rate regions for the GS and CS models in Theorem 1. The proofs are given in Section V.
Denote
(11) |
and define a function that gives the maximum of the input values as its output.
Theorem 1 (Inner Bounds for Multi-entity GS and CS Models).
An achievable rate region for the multi-entity GS model with entities is the union over all for all of the rate tuples such that for all and
(12) | ||||
(13) | ||||
(14) | ||||
(15) |
Corollary 1.
Suppose for all that
-
•
form a Markov chain, i.e., is a PD version of with respect to , or
-
•
is a LN BC with for all .
For these cases, strong privacy, i.e.,
(19) |
can be achieved for the multi-entity GS and CS models in combination with the other corresponding bounds given in Theorem 1.
Corollary 1 illustrates that it is possible to obtain strong privacy, i.e., negligible unnormalized privacy leakage, without the requirement of a common randommness that is hidden from an eavesdropper assumed in [9, 10, 24]. This is the case because the observation of each decoder is “better” than the observation of the corresponding encoder with respect to the hidden source for all entities.
Remark 1.
The rate regions for our problem depend on the joint conditional probability distributions rather than only the marginal conditional distributions. Thus, the key-leakage-storage regions for the stochastically-degraded BCs are not necessarily equal to the regions for the corresponding PD BCs, unlike in the classic BC problem. Furthermore, since is fixed, the distinction between the LN BCs and essentially-less noisy BCs [29], is not necessary.
We next give simple outer bounds for the multi-entity key-leakage-storage regions for the GS model and for the CS model when the BCs for all are PD BCs or LN BCs, as defined in Corollary 1. These simple outer bounds give insights into the reason for different bounds on the secret-key rates. Based on these insights, we show a special multi-enrollment case in the next section with a less stringent secrecy constraint, for which the inner and outer bounds differ only in the Markov chains imposed and we illustrate that they match for simpler models.
Lemma 1.
The proof of Lemma 1 follows straightforwadly by following the steps in [12, Section VI], defining the auxiliary random variables for all and , and by bounding ; therefore, we omit the proof.
The outer bounds do not include the inequalities in (15) and (17). Furthermore, the secret-key rate achieved by the inner bound in (12) is smaller than the outer bound given in (20), where the difference is the term . This term is a result of the constraint in (44) that is imposed to satisfy the strong and mutual key independence constraint given in (7). Therefore, we next consider a model without the constraint in (7) and use a secrecy-leakage constraint that is less stringent than the one in (9), i.e., replace (9) by
(22) |
which is also a strong secrecy metric. Due to the lack of a mutual key independence constraint, the model in the next section is not a multi-entity model but rather a multi-enrollment model. For a special case of this multi-enrollment key agreement problem, we establish inner and outer bounds for the key-leakage-storage regions that comprise the same bounds but for different Markov chains.
IV Bounds for a Multi-Enrollment Model
Consider next the multi-enrollment model, where the strong and mutual key independence constraint (7) of the multi-entity model is not imposed. Assume further entities that measure noisy outputs of the same hidden source through separate channels that have the same channel transition matrices, i.e., for all , , and we have
(23) |
This model is common for SRAM PUFs, for which each measurement channel is modeled as a BSC with the same crossover probability corresponding to a worst case scenario[30]. Using (23), we define a multi-enrollment model.
Definition 2.
A key-leakage-storage rate tuple is achievable for the multi-enrollment GS and CS models with measurements through a BC as in (23) if, given any , there is some , and two encoder and decoder pairs for which , , , , and
(reliability) | (24) | |||
(key uniformity) | (25) | |||
(privacy) | (26) | |||
(strong secrecy) | (27) | |||
(storage) | (28) | |||
(29) |
The multi-enrollment key-leakage-storage regions for the GS model and for the CS model are the closures of the set of all achievable rate tuples .
We characterize in Theorem 2 inner and outer bounds for and . The proofs of Theorem 2 are given in Section VI, where the reason for the necessity of the secrecy-leakage constraint in (27) that is less stringent than the joint secrecy-leakage constraint in (9) is given in Remark 2. Similarly, the reason for the necessity of the strong helper data (storage) independence constraint in (29) is discussed in Remark 4. We remark that the equalities in (25), (26), and (28) are required in the outer bounds in Theorem 2 to provide both upper and lower bounds on and in terms of Shannon entropy terms.
Denote
(30) |
Theorem 2.
(Inner Bounds for Multi-enrollment GS and CS Models): An achievable multi-enrollment key-leakage-storage region is the union over all and of the rate tuples such that for and
(31) | ||||
(32) | ||||
(33) | ||||
(34) | ||||
(35) | ||||
(36) |
An achievable multi-enrollment key-leakage-storage region is the union over all and of the rate tuples such that for , (31)-(33), and
(37) | ||||
(38) | ||||
(39) |
For both achievable rate regions and , we have
(40) |
(Outer Bounds for Multi-enrollment GS and CS Models) An outer bound for is the union over all and of the rate tuples such that , (31) - (36), and form a Markov chain for . An outer bound for is the union over all and of the rate tuples such that , (31) - (33), (37) - (39), and form a Markov chain for .
The inner and outer bounds differ because the outer bounds define rate regions for the Markov chains and , which are larger than the rate regions defined by the inner bounds that satisfy (40). For instance, in the achievability proof of Theorem 2, we apply the properties of the Markov chain in (86)(b), which does not form a Markov chain for the choice of and in the outer bounds. Therefore, inner and outer bounds do not match in general.
Corollary 2.
Example 1.
Consider the RO PUF model from [25, Section 4.1] where a transform-coding method is applied to conservatively model the measurement channels as independent BSCs with the same crossover probability of and where the hidden source output is . We therefore can apply the achievability results from Theorem 2 to this RO PUF model. Using [12, Theorem 3] to evaluate the boundary tuples of , it suffices to consider probability distributions for such that are BSCs with crossover probabilities
(41) |
Consider the projection of the boundary tuples of onto key-leakage plane, i.e., (31) and (32). We plot in Fig. 2 single-enrollment results where the privacy-leakage rate is measured with respect to single helper data and two-enrollment results for the sum rate of the two keys, both for [25]. To achieve a total secret-key rate of , the privacy-leakage rate for the two-enrollment model is approximately less than the privacy-leakage rate for the single-enrollment model for RO PUFs. The reason for this gain is the information bottleneck problem that arises from (31) and (32) to find the boundary tuples.
Example 2.
Consider uniform binary antipodal measurements over an additive white Gaussian noise (AWGN) channel. Define the signal power as and the noise power as , so we have a signal-to-noise ratio (SNR) of . If a matched filter, which maximizes the at the sampling instant for the AWGN channel, is applied at the encoder and decoder, the bit error probability is given by [31, pp. 96]
(42) |
The channel between input binary symbols and outputs of the matched filter is a BISO channel. Using [12, Theorem 3], we have that for that are BSCs with crossover probabilities given in (41) by replacing with , suffice to obtain the boundary tuples of . We remark that used in Example 1 corresponds to an SNR of approximately dB.
In Fig. 3, the privacy-leakage rate vs. secret-key rate boundary tuples are depicted for two cases. First, a two-enrollment model at dB with a sum rate for two secret keys is depicted, where each enrollment has a signal power of . For comparison, we plot a single-enrollment model with the signal power of , i.e., we have an SNR of approximately dB. Fig. 3 shows for the two cases with the same total signal power of , unlike in Example 1, that the single enrollment boundary tuple can result in a gain of approximately at its top left corner point in terms of the secret-key rates achieved for a given privacy-leakage rate. For such an AWGN channel with a fixed total signal power; therefore, the single-enrollment model can result in significant gains in terms of achieved secret-key rates as compared to the two-enrollment model for small values.
V Proof of Theorem 1
We provide a proof that follows from the output statistics of random binning (OSRB) method, proposed in [32] and further extended in [33], by applying the steps in [34, Section 1.6].
V-A Proof for the GS Model
Proof:
Fix . Let be i.i.d. according to (18). Assign three random bin indices to each realization for all , where represents the secret key, the helper data, and a public index referring to a random encoder-decoder pair fixed below. Assume , , and such that for all .
Apply the union bound to the reliability constraint in (5) to obtain the sum of error probabilities. This sum vanishes for any finite number when by using a Slepian-Wolf (SW) [35] decoder to estimate from if [32, Lemma 1]
(43) |
The key uniformity (6), mutual and strong key independence (7), and strong secrecy (9) constraints are satisfied if [32, Theorem 1]
(44) |
since (44) ensures that the three random indices are almost mutually independent and uniformly distributed, and they are almost independent of . Therefore, are almost independent of because determines for all .
Similarly, the public randomness is almost independent of , so it is almost independent of , if we have [32, Theorem 1]
(45) |
Thus, the public indices can be fixed and shared with all parties by generating them uniformly at random. The -th encoder can generate according to obtained from the binning scheme above to compute the bins from for all . This procedure induces a joint probability distribution that is almost equal to fixed in (18) [34, Section 1.6].
Applying the Fourier Motzkin elimination [36] using the software available in [37] to (43)-(45) for each separately, we obtain the inequalities
(46) | |||
(47) | |||
(48) |
for all .
To satisfy the constraints (46)-(48), we can fix the rates to
(49) | ||||
(50) | ||||
(51) |
for some such that when .
Consider the privacy leakage. Since are public, we can bound the privacy leakage as follows.
(52) |
where follows because form a Markov chain for all .
Consider two cases for the privacy leakage analysis.
Case 1: Suppose for any that we have
(53) |
i.e., , so are almost mutually independent [32, Theorem 1]. Therefore, we have
(54) |
for some such that when . Combining (52) and (54) proves strong privacy.
Case 2: Suppose for any that we have
(55) |
i.e., , so can reliably estimate [32, Lemma 1]. Therefore, we have
(56) |
where follows because determines , can realiably estimate for some such that when , and are i.i.d., and follows by (50) and (51).
Using the selection lemma [38, Lemma 2.2], these prove the achievability of the rate region . ∎
V-B Proof for the CS Model
We use the achievability proof for the GS model. Suppose the key , generated as in the GS model together with the helper data and public index , have the same cardinality as the corresponding embedded secret key , i.e., for all . The chosen key is uniformly distributed and independent of for all . Consider the -th encoder with inputs and output , and the -th decoder with inputs and output . All addition and subtraction operations are modulo- for all . The -th decoder of the GS model is used to obtain for all .
We have the error probability
(58) |
which is small due to the proof of achievability for the GS model.
Using (49) and (50), and from the one-time padding operation applied above, we can achieve a storage rate of
(59) |
for the CS model.
We have the secrecy leakage of
(60) |
where follows since are chosen independently of the public indices , follows because are chosen independently of , follows because for all , follows because and are almost mutually independent and each is almost uniformly distributed due to (44) for some such that when , and follows because the GS model satisfies the strong secrecy constraint (9) due to (44) for some such that when .
Consider the privacy leakage:
(61) |
where follows because are chosen independently of and for all and follows from the uniformity and mutual independence of .
Using the selection lemma, these prove the achievability of the rate region .
VI Proof of Thorem 2
We use the OSRB method steps in [34, Section 1.6].
VI-A Achievability Proof for the GS Model
Fix
(62) |
Let be i.i.d. according to (40). Assign three random bin indices to each realization for all . Assume , , and such that for .
Apply the union bound to the reliability constraint in (24), which vanishes when by using an SW decoder to estimate from if [32, Lemma 1]
(63) |
The key uniformity (25) constraint is satisfied if [32, Theorem 1]
(64) |
since (64) ensures that the three random indices are almost mutually independent and uniformly distributed.
Suppose a virtual joint encoder assigns six indices to each realization pair . This virtual encoder is an operational dual of the virtual decoder used in the proof of [18, Theorem 1]. Using the virtual joint encoder, the strong secrecy constraint in (27) and the strong helper data independence constraint in (29) are satisfied if [32, Theorem 1]
(65) |
and
(66) |
because (65) ensures that are almost mutually independent; whereas, (66) ensures that are almost mutually independent.
Remark 2.
The set of equations considered in (64)-(66) cannot be imposed for the joint secrecy-leakage constraint in (9) for general probability distributions , since to impose (9) one would replace (65) and (66) with
(67) |
which would also imply the mutual independence of secret keys in (7). However, the inequalities in (64) and (67) cannot be satisfied simultaneously in general as . This problem is avoided in the proof of Theorem 1 by imposing the inequality in (44) rather than (64).
The public randomness is almost independent of , so it is almost independent of , if we have [32, Theorem 1]
(68) |
Thus, the public indices can be fixed and shared publicly by generating them uniformly at random. can be generated according to for obtained from the binning scheme above to compute the bins from for . This procedure induces a joint probability distribution that is almost equal to that is fixed in (40) [34, Section 1.6].
Applying the Fourier Motzkin elimination to (63)-(66) and (68), we obtain the inequalities
(69) | |||
(70) | |||
(71) | |||
(72) | |||
(73) | |||
(74) | |||
(75) | |||
(76) | |||
(77) | |||
(78) | |||
(79) | |||
(80) | |||
(81) | |||
(82) |
Observe that we have
(83) | |||
(84) | |||
(85) |
due to (23) and (62). We therefore obtain
(86) |
where follows by (83) and follows from the Markov chain . A similar result can be shown by swaping the indices. Therefore, the constraints in (77) and (79) are inactive due to the constraints, respectively, in (76) and (80). Similarly, the constraints in (73) and (74) are inactive due to the constraints, respectively, in (71) and (72).
Replace the inequalities in (75) and (81), respectively, with
(87) | |||
(88) |
Then, (87) is inactive because (71) and (78) imply (87), and (88) is inactive because (72) and (82) imply (88). We remark that the rate region represented by (69)-(82) is the same as the region represented by replacing (75) and (81) with (87) and (88) because the corner points (i.e., the points that asymptotically achieve equalities in the given inequalities for fixed ) of the two rate regions are the same. Therefore, the inequalities in (75) and (81) are inactive.
Since and are public, we can bound the privacy leakage as follows.
(92) | |||
(93) |
where follows because form a Markov chain, follows for some such that when because for the two-enrollment model considered, (55) is satisfied due to the Markov chain for , and follows by (90) and (91), and because are i.i.d.
Using (92) for general rate tuples that satisfy the constraints (69)-(82), i.e., not only (89)-(91), we can bound the privacy leakage alternatively as
(94) |
where follows by (91) and because are i.i.d.
Using the selection lemma, these prove the achievability of the key-leakage-storage region .
VI-B Achievability Proof for the CS Model
The achievability proof for the CS model follows by applying the one-time padding step used in Section V-B.
VI-C Outer Bound Proofs for the Multi-enrollment Models
Suppose for some and , there is a pair of encoders and decoders such that (24)-(29) are satisfied by some key-leakage-storage tuple . Using (24) and Fano’s inequality, we obtain
(95) |
where permits randomized decoding, such that if .
Let , which satisfies the Markov chain for all and .
Remark 3.
For the choice of (and similarly for ) for , do not form a Markov chain for all although for the inner bound we use this Markov chain. This is the reason why inner and outer bounds do not match in general.
Proof for (31): We obtain for the multi-enrollment GS and CS models for that
(96) |
follows by (25) and (95), follows by (27), follows by applying the data-processing inequality to the Markov chain
(97) |
and follows from the definition of .
Proof for (32): Observe for the multi-enrollment models that
(98) |
where follows by (26) and from the Markov chain , follows because due to (23), follows from the Markov chain , follows by (95), follows because the channel and source are memoryless and from the Markov chain in (97), and follows from the definition of .
Proof for (33): Observe for the multi-enrollment models that
(99) |
where follows by (26) and from the Markov chain , follows by (95) and from the Markov chain for , follows because the channel and source are memoryless, follows from the Markov chain
(100) |
and follows from the definition of .
Proof for (34): Observe for the multi-enrollment GS model for that
(101) |
where follows by (28), follows from the encoding steps, follows by (95), follows because the source and channel are memoryless, follows from the data-processing inequality applied to the Markov chains in (97) and (100), and follows from the definition of .
Proof for (37): Observe for the multi-enrollment CS model for that
(102) |
where follows by (28), follows because is independent of and from the encoding step, follows because the source and channel are memoryless, follows by applying the data-processing inequality to the Markov chain in (100), and follows from the definition of .
Proof for (35): We have for the multi-enrollment GS model for that
(103) |
where follows by (25), follows by (27), and follows from the definition of .
Proof for (38): Similarly, we have for the multi-enrollment CS model for that
(104) |
where follows from the definition of .
Proof for (36): We obtain for the multi-enrollment GS model for and as defined in (30) that
(105) | |||
(106) |
where follows by (25), follows by (27) and (29), and follows from the definitions of and .
Proof for (39): We have for the multi-enrollment CS model for and as defined in (30) that
(107) | |||
(108) |
where follows by (29) and follows from the definitions of and .
Remark 4.
Introduce a uniformly distributed time-sharing random variable independent of other random variables. Define , , , and so that form a Markov chain for . The outer bound for the GS model follows by using the introduced random variables in (96), (98), (99), (101), (103), and (106), and letting . Similarly, the outer bound for the CS model follows by using the introduced random variables in (96), (98), (99), (102), (104), and (108), and letting .
VII Conclusion
We derived inner bounds for the multi-entity key-leakage-storage regions for GS and CS models with strong secrecy, a hidden identifier source, and correlated noise components at the encoder and decoder measurements that are modeled as BCs. The inner bounds are valid for any finite number of entities that use the same hidden source to agree on a secret key. We argued that the mutual key independence constraint we impose makes the proposed multi-entity key agreement problem a proper multi-user extension of the classic single-enrollment key agreement problem, unlike the multi-enrollment key agreement problem considered in the literature. A set of degraded and less-noisy BCs was shown to provide strong privacy without a need for a common randomness. We also established inner and outer bounds for the key-lekage-storage regions for a two-enrollment model with measurement channels that are valid for SRAM and RO PUFs. Inner and outer bounds were shown to differ only in the Markov chains imposed and they match if the storage and privacy-leakage rate constraints are removed. Two examples illustrated that depending on the constraints of the practical scenario, a single or multiple enrollments might perform better in terms of the secret-key vs. privacy-leakage rate ratio. In future work, we will find a set of symmetric probability distributions for which the strong helper data independence constraint in the two-enrollment model can be eliminated.
Acknowledgment
O. Günlü thanks Rafael F. Schaefer for fruitful discussions.
References
- [1] P. Campisi, Security and Privacy in Biometrics. London, U.K.: Springer-Verlag, 2013.
- [2] B. Gassend, “Physical random functions,” Master’s thesis, M.I.T., Cambridge, MA, Jan. 2003.
- [3] O. Günlü, “Key agreement with physical unclonable functions and biometric identifiers,” Ph.D. dissertation, TU Munich, Germany, Nov. 2018, published by Dr. Hut Verlag in Feb. 2019.
- [4] A. D. Wyner, “The wire-tap channel,” Bell Labs Tech. J., vol. 54, no. 8, pp. 1355–1387, Oct. 1975.
- [5] P. W. Cuff, H. H. Permuter, and T. M. Cover, “Coordination capacity,” IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4181–4206, Sep. 2010.
- [6] G. Cervia, L. Luzzi, M. L. Treust, and M. R. Bloch, “Strong coordination of signals and actions over noisy channels with two-sided state information,” Mar. 2018, [Online]. Available: arxiv.org/abs/1801.10543.
- [7] R. Ahlswede and I. Csiszár, “Common randomness in information theory and cryptography - Part I: Secret sharing,” IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121–1132, July 1993.
- [8] U. M. Maurer, “Secret key agreement by public discussion from common information,” IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 2733–2742, May 1993.
- [9] T. Ignatenko and F. M. J. Willems, “Biometric systems: Privacy and secrecy aspects,” IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 956–973, Dec. 2009.
- [10] L. Lai, S.-W. Ho, and H. V. Poor, “Privacy-security trade-offs in biometric security systems - Part I: Single use case,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 122–139, Mar. 2011.
- [11] I. Csiszár and P. Narayan, “Common randomness and secret key generation with a helper,” IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344–366, Mar. 2000.
- [12] O. Günlü and G. Kramer, “Privacy, secrecy, and storage with multiple noisy measurements of identifiers,” IEEE Trans. Inf. Forensics Security, vol. 13, no. 11, pp. 2872–2883, Nov. 2018.
- [13] L. Lai, S. Ho, and H. V. Poor, “Privacy–security trade-offs in biometric security systems - Part II: Multiple use case,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 140–151, Mar. 2011.
- [14] L. Kusters and F. M. J. Willems, “Secret-key capacity regions for multiple enrollments with an SRAM-PUF,” IEEE Trans. Inf. Forensics Security, vol. 14, no. 9, pp. 2276–2287, Sep. 2019.
- [15] A. Juels and M. Wattenberg, “A fuzzy commitment scheme,” in ACM Conf. Comp. Commun. Security, New York, NY, Nov. 1999, pp. 28–36.
- [16] L. Kusters, T. Ignatenko, F. M. J. Willems, R. Maes, E. van der Sluis, and G. Selimis, “Security of helper data schemes for SRAM-PUF in multiple enrollment scenarios,” in IEEE Int. Symp. Inf. Theory, Aachen, Germany, June 2017, pp. 1803–1807.
- [17] I. Land, S. Huettinger, P. A. Hoeher, and J. B. Huber, “Bounds on information combining,” IEEE Trans. Inf. Theory, vol. 51, no. 2, pp. 612–619, Feb. 2005.
- [18] L. Kusters, O. Günlü, and F. M. Willems, “Zero secrecy leakage for multiple enrollments of physical unclonable functions,” in Symp. Inf. Theory Sign. Process. Benelux, Twente, The Netherlands, May-June 2018, pp. 119–127.
- [19] O. Günlü, O. Iscan, V. Sidorenko, and G. Kramer, “Code constructions for physical unclonable functions and biometric secrecy systems,” IEEE Trans. Inf. Forensics Security, vol. 14, no. 11, pp. 2848–2858, Nov. 2019.
- [20] Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, “Fuzzy extractors: How to generate strong keys from biometrics and other noisy data,” SIAM J. Comput., vol. 38, no. 1, pp. 97–139, Jan. 2008.
- [21] D. Merli, F. Stumpf, and C. Eckert, “Improving the quality of ring oscillator PUFs on FPGAs,” in ACM Workshop Embedded Sys. Security, New York, NY, Oct. 2010, pp. 9:1–9:9.
- [22] O. Günlü, R. F. Schaefer, and G. Kramer, “Private authentication with physical identifiers through broadcast channel measurements,” in IEEE Inf. Theory Workshop, Visby, Sweden, Aug. 2019, pp. 1–5.
- [23] T. M. Cover and J. A. Thomas, Elements of Information Theory, 2nd ed. Hoboken, NJ: John Wiley & Sons, 2012.
- [24] R. A. Chou, M. R. Bloch, and E. Abbe, “Polar coding for secret-key generation,” IEEE Trans. Inf. Theory, vol. 61, no. 11, pp. 6213–6237, Nov. 2015.
- [25] O. Günlü, T. Kernetzky, O. İşcan, V. Sidorenko, G. Kramer, and R. F. Schaefer, “Secure and reliable key agreement with physical unclonable functions,” Entropy, vol. 20, no. 5, May 2018.
- [26] J. Wayman, A. Jain, D. Maltoni, and D. M. (Eds), Biometric Systems: Technology, Design and Performance Evaluation. London, U.K.: Springer-Verlag, 2005.
- [27] R. Pappu, “Physical one-way functions,” Ph.D. dissertation, M.I.T., Cambridge, MA, Oct. 2001.
- [28] O. Günlü, K. Kittichokechai, R. F. Schaefer, and G. Caire, “Controllable identifier measurements for private authentication with secret keys,” IEEE Trans. Inf. Forensics Security, vol. 13, no. 8, pp. 1945–1959, Aug. 2018.
- [29] C. Nair, “Capacity regions of two new classes of two-receiver broadcast channels,” IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4207–4214, Sep. 2010.
- [30] R. Maes, P. Tuyls, and I. Verbauwhede, “A soft decision helper data algorithm for SRAM PUFs,” in IEEE Int. Symp. Inf. Theory, Seoul, South Korea, June 2009, pp. 2101–2105.
- [31] J. Hagenauer, “Lecture Notes in Digital Communications 1,” G. Kramer and O. Günlü, Eds. Singapore: TU Munich Asia, Feb. 2019.
- [32] M. H. Yassaee, M. R. Aref, and A. Gohari, “Achievability proof via output statistics of random binning,” IEEE Trans. Inf. Theory, vol. 60, no. 11, pp. 6760–6786, Nov. 2014.
- [33] M. Nafea and A. Yener, “A new wiretap channel model and its strong secrecy capacity,” IEEE Trans. Inf. Theory, vol. 64, no. 3, pp. 2077–2092, Mar. 2018.
- [34] M. Bloch, Lecture Notes in Information-Theoretic Security. Atlanta, GA: Georgia Inst. Technol., July 2018.
- [35] D. Slepian and J. Wolf, “Noiseless coding of correlated information sources,” IEEE Trans. Inf. Theory, vol. 19, no. 4, pp. 471–480, July 1973.
- [36] A. Schrijver, Theory of Linear and Integer Programming. Chichester, England: John Wiley & Sons, June 1998.
- [37] I. B. Gattegno, Z. Goldfeld, and H. H. Permuter, “Fourier-Motzkin elimination software for information theoretic inequalities,” 2016.
- [38] M. Bloch and J. Barros, Physical-layer Security. Cambridge, U.K.: Cambridge Uni. Press, 2011.
![]() |
Onur Günlü (S’10–M’18) received the B.Sc. degree (with high distinction) in Electrical and Electronics Engineering from the Bilkent University, Turkey in 2011; M.Sc. (with high distinction) and Dr.-Ing. (Ph.D. equivalent) degrees in Communication Engineering both from the Technical University of Munich (TUM), Germany in October 2013 and November 2018, respectively. He was a Working Student in the Communication Systems division of Intel Mobile Communications (IMC) during November 2012 - March 2013. He worked as a Research and Teaching Assistant at TUM between February 2014 - May 2019. He was a Visiting Researcher at the Information and Communication Theory (ICT) Lab of TU Eindhoven, The Netherlands during February 2018 - March 2018. He has been a Research Associate and Dozent at TU Berlin, Germany since June 2019 and a Brain City Berlin Ambassador since June 2020. His research interests include information theoretic privacy and security, coding theory, statistical signal processing for biometrics and physical unclonable functions (PUFs), federated learning (FL) with differential privacy (DP) guarantees, and doubly-exponential secure identification. Among his publications is the recent book Key Agreement with Physical Unclonable Functions and Biometric Identifiers (Dr. Hut Verlag, 2019). He is currently a Guest Editor of the IEEE Journal on Selected Areas in Information theory and is a Reviewer Board Member of the MDPI Entropy, Computers, and Information journals. |