The two-terminal key agreement problem with biometric or physical identifiers is considered. Two linear code constructions based on Wyner-Ziv coding are developed. The first construction uses random linear codes and achieves all points of the key-leakage-storage regions of the generated-secret and chosen-secret models. The second construction uses nested polar codes for vector quantization during enrollment and for error correction during reconstruction. The simulation results show that the nested polar codes achieve privacy leakage and storage rates that improve on existing code designs. One proposed code achieves a rate tuple that cannot be achieved by existing methods.
|Number of pages||11|
|Journal||IEEE Transactions on Information Forensics and Security|
|Publication status||Published - Nov 2019|
- Information theoretic security
- key agreement
- physical unclonable functions
- Wyner-Ziv coding