Secret Key Agreement with Physical Unclonable Functions: An Optimality Summary

12/16/2020
by   Onur Günlü, et al.
0

We address security and privacy problems for digital devices and biometrics from an information-theoretic optimality perspective, where a secret key is generated for authentication, identification, message encryption/decryption, or secure computations. A physical unclonable function (PUF) is a promising solution for local security in digital devices and this review gives the most relevant summary for information theorists, coding theorists, and signal processing community members who are interested in optimal PUF constructions. Low-complexity signal processing methods such as transform coding that are developed to make the information-theoretic analysis tractable are discussed. The optimal trade-offs between the secret-key, privacy-leakage, and storage rates for multiple PUF measurements are given. Proposed optimal code constructions that jointly design the vector quantizer and error-correction code parameters are listed. These constructions include modern and algebraic codes such as polar codes and convolutional codes, both of which can achieve small block-error probabilities at short block lengths, corresponding to a small number of PUF circuits. Open problems in the PUF literature from a signal processing, information theory, coding theory, and hardware complexity perspectives and their combinations are listed to stimulate further advancements in the research on local privacy and security.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/04/2020

Low-complexity and Reliable Transforms for Physical Unclonable Functions

Noisy measurements of a physical unclonable function (PUF) are used to s...
research
02/26/2020

Secure and Reliable Key Agreement with Physical Unclonable Functions

Different transforms used in binding a secret key to correlated physical...
research
08/22/2022

Secret-Key Agreement Using Physical Identifiers for Degraded and Less Noisy Authentication Channels

Secret-key agreement based on biometric or physical identifiers is a pro...
research
05/31/2018

False-Accept/False-Reject Trade-offs in Biometric Authentication Systems

Biometric authentication systems, based on secret key generation, work a...
research
04/05/2018

Composable, Unconditionally Secure Message Authentication without any Secret Key

We consider a setup in which the channel from Alice to Bob is less noisy...
research
04/06/2018

Low Complexity Secure Code (LCSC) Design for Big Data in Cloud Storage Systems

In the era of big data, reducing the computational complexity of servers...
research
04/27/2020

Nested Tailbiting Convolutional Codes for Secrecy, Privacy, and Storage

A key agreement problem is considered that has a biometric or physical i...

Please sign up or login with your details

Forgot password? Click here to reset