Cargando…
An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions
We address security and privacy problems for digital devices and biometrics from an information-theoretic optimality perspective to conduct authentication, message encryption/decryption, identification or secure and private computations by using a secret key. A physical unclonable function (PUF) pro...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7824005/ https://www.ncbi.nlm.nih.gov/pubmed/33374486 http://dx.doi.org/10.3390/e23010016 |
_version_ | 1783639971871064064 |
---|---|
author | Günlü, Onur Schaefer, Rafael F. |
author_facet | Günlü, Onur Schaefer, Rafael F. |
author_sort | Günlü, Onur |
collection | PubMed |
description | We address security and privacy problems for digital devices and biometrics from an information-theoretic optimality perspective to conduct authentication, message encryption/decryption, identification or secure and private computations by using a secret key. A physical unclonable function (PUF) provides local security to digital devices and this review gives the most relevant summary for information theorists, coding theorists, and signal processing community members who are interested in optimal PUF constructions. Low-complexity signal processing methods are applied to simplify information-theoretic analyses. The best trade-offs between the privacy-leakage, secret-key, and storage rates are discussed. Proposed optimal constructions that jointly design the vector quantizer and error-correction code parameters are listed. These constructions include modern and algebraic codes such as polar codes and convolutional codes, both of which can achieve small block-error probabilities at short block lengths, corresponding to a small number of PUF circuits. Open problems in the PUF literature from signal processing, information theory, coding theory, and hardware complexity perspectives and their combinations are listed to stimulate further advancements in the research on local privacy and security. |
format | Online Article Text |
id | pubmed-7824005 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-78240052021-02-24 An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions Günlü, Onur Schaefer, Rafael F. Entropy (Basel) Review We address security and privacy problems for digital devices and biometrics from an information-theoretic optimality perspective to conduct authentication, message encryption/decryption, identification or secure and private computations by using a secret key. A physical unclonable function (PUF) provides local security to digital devices and this review gives the most relevant summary for information theorists, coding theorists, and signal processing community members who are interested in optimal PUF constructions. Low-complexity signal processing methods are applied to simplify information-theoretic analyses. The best trade-offs between the privacy-leakage, secret-key, and storage rates are discussed. Proposed optimal constructions that jointly design the vector quantizer and error-correction code parameters are listed. These constructions include modern and algebraic codes such as polar codes and convolutional codes, both of which can achieve small block-error probabilities at short block lengths, corresponding to a small number of PUF circuits. Open problems in the PUF literature from signal processing, information theory, coding theory, and hardware complexity perspectives and their combinations are listed to stimulate further advancements in the research on local privacy and security. MDPI 2020-12-24 /pmc/articles/PMC7824005/ /pubmed/33374486 http://dx.doi.org/10.3390/e23010016 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Review Günlü, Onur Schaefer, Rafael F. An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions |
title | An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions |
title_full | An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions |
title_fullStr | An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions |
title_full_unstemmed | An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions |
title_short | An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions |
title_sort | optimality summary: secret key agreement with physical unclonable functions |
topic | Review |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7824005/ https://www.ncbi.nlm.nih.gov/pubmed/33374486 http://dx.doi.org/10.3390/e23010016 |
work_keys_str_mv | AT gunluonur anoptimalitysummarysecretkeyagreementwithphysicalunclonablefunctions AT schaeferrafaelf anoptimalitysummarysecretkeyagreementwithphysicalunclonablefunctions AT gunluonur optimalitysummarysecretkeyagreementwithphysicalunclonablefunctions AT schaeferrafaelf optimalitysummarysecretkeyagreementwithphysicalunclonablefunctions |