Zobrazeno 1 - 10
of 565
pro vyhledávání: '"Yagi, Hideki"'
Autor:
Nomura, Ryo, Yagi, Hideki
Two typical fixed-length random number generation problems in information theory are considered for general sources. One is the source resolvability problem and the other is the intrinsic randomness problem. In each of these problems, the optimum ach
Externí odkaz:
http://arxiv.org/abs/2404.11097
We investigate the rate-distortion-leakage region of the Chief Executive Officer (CEO) problem with a passive eavesdropper and privacy constraints, considering a general distortion measure. While an inner bound directly follows from the previous work
Externí odkaz:
http://arxiv.org/abs/2301.12526
Autor:
Nomura, Ryo1 (AUTHOR) nomu@waseda.jp, Yagi, Hideki2 (AUTHOR) h.yagi@uec.ac.jp
Publikováno v:
Entropy. Sep2024, Vol. 26 Issue 9, p766. 34p.
Secret-key agreement based on biometric or physical identifiers is a promising security protocol for authenticating users or devices with small chips due to its lightweight security. In previous studies, the fundamental limits of such a protocol were
Externí odkaz:
http://arxiv.org/abs/2208.10478
Autor:
Yachongka, Vamoua, Yagi, Hideki
We propose a biometric identification system where the chosen- and generated-secret keys are used simultaneously, and investigate its fundamental limits from information-theoretic perspectives. The system consists of two phases: enrollment and identi
Externí odkaz:
http://arxiv.org/abs/2206.14356
We analyze the fundamental trade-off of secret key-based authentication systems in the presence of an eavesdropper for correlated Gaussian sources. A complete characterization of trade-off among secret-key, storage, and privacy-leakage rates of both
Externí odkaz:
http://arxiv.org/abs/2202.10018
Autor:
Shinohara, Naruki, Yagi, Hideki
Privacy-constrained source coding problems have become increasingly important recently, and the utility-privacy trade-off has been investigated for various systems. As pioneering work, Yamamoto (1983) found theoretical limits of the coding rate, priv
Externí odkaz:
http://arxiv.org/abs/2105.10135
In the present paper, we investigate the fundamental trade-off of identification, secrecy, storage, and privacy-leakage rates in biometric identification systems for hidden or remote Gaussian sources. We introduce a technique for deriving the capacit
Externí odkaz:
http://arxiv.org/abs/2010.10799
Autor:
Yachongka, Vamoua, Yagi, Hideki
The fundamental limits of biometric identification systems under a strong secrecy criterion are investigated. In the previous studies of this scenario, the fundamental trade-off among secrecy, template, privacy- and secrecy-leakages has been revealed
Externí odkaz:
http://arxiv.org/abs/2002.05100
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.