{"id":"https://openalex.org/W4310901937","doi":"https://doi.org/10.1109/itw54588.2022.9965800","title":"Secret-Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels","display_name":"Secret-Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels","publication_year":2022,"publication_date":"2022-11-01","ids":{"openalex":"https://openalex.org/W4310901937","doi":"https://doi.org/10.1109/itw54588.2022.9965800"},"language":"en","primary_location":{"id":"doi:10.1109/itw54588.2022.9965800","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw54588.2022.9965800","pdf_url":null,"source":{"id":"https://openalex.org/S4363606450","display_name":"2022 IEEE Information Theory Workshop (ITW)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Information Theory Workshop (ITW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072667614","display_name":"Vamoua Yachongka","orcid":"https://orcid.org/0000-0001-7862-0005"},"institutions":[{"id":"https://openalex.org/I180203408","display_name":"Yokohama National University","ror":"https://ror.org/03zyp6p76","country_code":"JP","type":"education","lineage":["https://openalex.org/I180203408"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Vamoua Yachongka","raw_affiliation_strings":["Yokohama National University,Dept. of Electrical and Computer Engineering,Yokohama,Kanagawa,Japan,240-8501"],"affiliations":[{"raw_affiliation_string":"Yokohama National University,Dept. of Electrical and Computer Engineering,Yokohama,Kanagawa,Japan,240-8501","institution_ids":["https://openalex.org/I180203408"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047903778","display_name":"Hideki Yagi","orcid":"https://orcid.org/0000-0003-0961-7077"},"institutions":[{"id":"https://openalex.org/I20529979","display_name":"University of Electro-Communications","ror":"https://ror.org/02x73b849","country_code":"JP","type":"education","lineage":["https://openalex.org/I20529979"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hideki Yagi","raw_affiliation_strings":["The University of Electro-Communications, Chofu,Dept. Computer and Network Engineering,Tokyo,Japan,182-8585"],"affiliations":[{"raw_affiliation_string":"The University of Electro-Communications, Chofu,Dept. Computer and Network Engineering,Tokyo,Japan,182-8585","institution_ids":["https://openalex.org/I20529979"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073676843","display_name":"Hideki Ochiai","orcid":"https://orcid.org/0000-0001-9303-5250"},"institutions":[{"id":"https://openalex.org/I180203408","display_name":"Yokohama National University","ror":"https://ror.org/03zyp6p76","country_code":"JP","type":"education","lineage":["https://openalex.org/I180203408"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hideki Ochiai","raw_affiliation_strings":["Yokohama National University,Dept. of Electrical and Computer Engineering,Yokohama,Kanagawa,Japan,240-8501"],"affiliations":[{"raw_affiliation_string":"Yokohama National University,Dept. of Electrical and Computer Engineering,Yokohama,Kanagawa,Japan,240-8501","institution_ids":["https://openalex.org/I180203408"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5072667614"],"corresponding_institution_ids":["https://openalex.org/I180203408"],"apc_list":null,"apc_paid":null,"fwci":0.6431,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.59555106,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"2","issue":null,"first_page":"232","last_page":"237"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9605000019073486,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7238441109657288},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.6649158596992493},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.6629509925842285},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5835927724838257},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5110505819320679},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.5071108341217041},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4783356189727783},{"id":"https://openalex.org/keywords/gaussian","display_name":"Gaussian","score":0.468630313873291},{"id":"https://openalex.org/keywords/random-variable","display_name":"Random variable","score":0.4446716904640198},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.262725830078125},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.24119535088539124},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.20686575770378113},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.09106847643852234},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.07213157415390015}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7238441109657288},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.6649158596992493},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.6629509925842285},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5835927724838257},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5110505819320679},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.5071108341217041},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4783356189727783},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.468630313873291},{"id":"https://openalex.org/C122123141","wikidata":"https://www.wikidata.org/wiki/Q176623","display_name":"Random variable","level":2,"score":0.4446716904640198},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.262725830078125},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.24119535088539124},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.20686575770378113},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.09106847643852234},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.07213157415390015},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itw54588.2022.9965800","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw54588.2022.9965800","pdf_url":null,"source":{"id":"https://openalex.org/S4363606450","display_name":"2022 IEEE Information Theory Workshop (ITW)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Information Theory Workshop (ITW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5}],"awards":[],"funders":[{"id":"https://openalex.org/F4320337504","display_name":"Research and Development","ror":"https://ror.org/027s68j25"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W609951012","https://openalex.org/W949353694","https://openalex.org/W2043769961","https://openalex.org/W2088455835","https://openalex.org/W2119953367","https://openalex.org/W2144387589","https://openalex.org/W2168892181","https://openalex.org/W2169212403","https://openalex.org/W2225497109","https://openalex.org/W2611093107","https://openalex.org/W2791184774","https://openalex.org/W2955388057","https://openalex.org/W2962706018","https://openalex.org/W2963249535","https://openalex.org/W3093598414","https://openalex.org/W3102526553","https://openalex.org/W3104710021","https://openalex.org/W3125070931","https://openalex.org/W3140053156","https://openalex.org/W4251984466","https://openalex.org/W4252541008","https://openalex.org/W4289655355","https://openalex.org/W4300840296","https://openalex.org/W4310901937","https://openalex.org/W6684566051","https://openalex.org/W6689343174"],"related_works":["https://openalex.org/W4378651134","https://openalex.org/W4252684102","https://openalex.org/W2352307597","https://openalex.org/W1979633005","https://openalex.org/W2163724607","https://openalex.org/W3135403405","https://openalex.org/W2023227762","https://openalex.org/W2608983118","https://openalex.org/W1980092392","https://openalex.org/W37347591"],"abstract_inverted_index":{"Secret-key":[0],"agreement":[1,38],"based":[2],"on":[3],"biometric":[4],"or":[5,16],"physical":[6,41],"identifiers":[7],"is":[8,50,174,210],"a":[9,36,169],"promising":[10],"security":[11],"protocol":[12],"for":[13,152,159,199,206],"authenticating":[14],"users":[15],"devices":[17],"with":[18,40,110],"small":[19],"chips":[20],"and":[21,28,76,106,164,196],"has":[22],"been":[23],"extensively":[24],"studied":[25],"recently.":[26],"Kittichokechai":[27],"Caire":[29],"(2015)":[30],"investigated":[31],"the":[32,44,47,53,61,73,80,96,99,116,120,148,160,178,182,190,203],"optimal":[33,100],"trade-off":[34],"in":[35,72,95,134,147],"secret-key":[37],"model":[39,62],"identifiers,":[42],"where":[43],"structure":[45],"of":[46,84,98,103,118,137,162,181,193],"authentication":[48,138,167,214],"channels":[49,139],"similar":[51],"to":[52,128,176],"wiretap":[54],"channels,":[55,168],"from":[56],"information":[57],"theoretic":[58],"approaches.":[59],"Later,":[60],"was":[63],"extended":[64],"by":[65],"G\u00fcnl\u00fc":[66],"et":[67],"al.":[68],"(2018)":[69],"introducing":[70],"noise":[71],"enrollment":[74],"phase":[75],"cost-constrained":[77],"actions":[78],"at":[79],"decoder.":[81],"The":[82,156],"results":[83],"these":[85,111],"studies":[86],"show":[87],"that":[88,140],"two":[89,112],"auxiliary":[90,113,144,171],"random":[91,114,145,172],"variables":[92],"are":[93,132],"involved":[94],"expressions":[97],"rate":[101,121],"regions":[102],"secret-key,":[104,194],"storage,":[105,195],"privacy-leakage":[107,197],"rates.":[108],"However,":[109],"variables,":[115],"complexity":[117],"computing":[119],"region":[122,150,180,192,205],"may":[123],"be":[124],"prohibitively":[125],"high.":[126],"Due":[127],"this":[129],"problem,":[130],"we":[131,187],"interested":[133],"exploring":[135],"classes":[136],"need":[141],"only":[142],"one":[143],"variable":[146,173],"capacity":[149,179,191,204],"expression":[151],"discrete":[153],"source":[154],"settings.":[155],"result":[157],"shows":[158],"class":[161],"degraded":[163],"less":[165],"noisy":[166],"single":[170],"sufficient":[175],"express":[177],"model.":[183],"As":[184],"an":[185],"example,":[186],"also":[188],"derive":[189],"rates":[198],"binary":[200],"sources.":[201],"Furthermore,":[202],"scalar":[207],"Gaussian":[208,213],"sources":[209],"derived":[211],"under":[212],"channels.":[215]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
