We analyze the fundamental trade-off of secret key-based authentication systems in the presence of an eavesdropper for correlated Gaussian sources. A complete characterization of trade-off among secret-key, storage, and privacy-leakage rates of both generated and chosen secret models is provided. One of the main contributions is revealing that unlike the known results for discrete sources, there is no need for the second auxiliary random variable in characterizing the capacity regions for the Gaussian cases. In addition, it is shown that the strong secrecy for secrecy-leakage of the systems can be achieved by an information-spectrum approach, and the parametric expressions (computable forms) of the capacity regions are also derived.
翻译:我们分析了秘密关键认证系统在相关高斯来源的窃听器面前进行的基本权衡。提供了对所产生和选定的秘密模式之间秘密交易、存储和隐私泄漏率的全面定性。其中一项主要贡献表明,与已知的离散来源结果不同,没有必要用第二个辅助随机变量来描述高斯案例的能力区域。此外,还表明,通过信息频谱方法可以实现系统保密保密性,并可以得出能力区域的参数表达(可比较形式)。