Robust Secure Authentication and Data Storage with Perfect Secrecy
We consider an authentication process that makes use of biometric data or the output of a physical unclonable function (PUF), respectively, from an information theoretical point of view. We analyse different definitions of achievability for the authentication model. For the secrecy of the key genera...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2018-04-01
|
Series: | Cryptography |
Subjects: | |
Online Access: | http://www.mdpi.com/2410-387X/2/2/8 |