Review
Version 1
Preserved in Portico This version is not peer-reviewed
Secret Key Agreement with Physical Unclonable Functions: An Optimality Summary
Version 1
: Received: 4 November 2020 / Approved: 5 November 2020 / Online: 5 November 2020 (10:39:44 CET)
A peer-reviewed article of this Preprint also exists.
Günlü, O.; Schaefer, R. An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions. Entropy 2021, 23, 16. Günlü, O.; Schaefer, R. An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions. Entropy 2021, 23, 16.
Abstract
We address security and privacy problems for digital devices and biometrics from an information-theoretic optimality perspective, where a secret key is generated for authentication, identification, message encryption/decryption, or secure computations. A physical unclonable function (PUF) is a promising solution for local security in digital devices and this review gives the most relevant summary for information theorists, coding theorists, and signal processing community members who are interested in optimal PUF constructions. Low-complexity signal processing methods such as transform coding that are developed to make the information-theoretic analysis tractable are discussed. The optimal trade-offs between the secret-key, privacy-leakage, and storage rates for multiple PUF measurements are given. Proposed optimal code constructions that jointly design the vector quantizer and error-correction code parameters are listed. These constructions include modern and algebraic codes such as polar codes and convolutional codes, both of which can achieve small block-error probabilities at short block lengths, corresponding to a small number of PUF circuits. Open problems in the PUF literature from a signal processing, information theory, coding theory, and hardware complexity perspectives and their combinations are listed to stimulate further advancements in the research on local privacy and security.
Keywords
physical unclonable functions; secret key agreement; private authentication; coding for secrecy and privacy; polar codes; nested codes
Subject
Engineering, Electrical and Electronic Engineering
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment