Please use this identifier to cite or link to this item: http://dx.doi.org/10.14279/depositonce-11248
For citation please use:
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGünlü, Onur-
dc.contributor.authorSchaefer, Rafael-
dc.date.accessioned2021-01-11T14:20:55Z-
dc.date.available2021-01-11T14:20:55Z-
dc.date.issued2020-12-24-
dc.identifier.urihttps://depositonce.tu-berlin.de/handle/11303/12406-
dc.identifier.urihttp://dx.doi.org/10.14279/depositonce-11248-
dc.description.abstractWe address security and privacy problems for digital devices and biometrics from an information-theoretic optimality perspective to conduct authentication, message encryption/decryption, identification or secure and private computations by using a secret key. A physical unclonable function (PUF) provides local security to digital devices and this review gives the most relevant summary for information theorists, coding theorists, and signal processing community members who are interested in optimal PUF constructions. Low-complexity signal processing methods are applied to simplify information-theoretic analyses. The best trade-offs between the privacy-leakage, secret-key, and storage rates are discussed. Proposed optimal constructions that jointly design the vector quantizer and error-correction code parameters are listed. These constructions include modern and algebraic codes such as polar codes and convolutional codes, both of which can achieve small block-error probabilities at short block lengths, corresponding to a small number of PUF circuits. Open problems in the PUF literature from signal processing, information theory, coding theory, and hardware complexity perspectives and their combinations are listed to stimulate further advancements in the research on local privacy and security.en
dc.description.sponsorshipBMBF, 16KIS1004, Verbundprojekt: Post Shannon Kommunikation - NewCom -; Teilvorhaben: Physikalische Dienste-Integrations-Konzepte für neue Kommunikationsmodelleen
dc.description.sponsorshipTU Berlin, Open-Access-Mittel – 2020en
dc.language.isoenen
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/en
dc.subject.ddc600 Technik, Technologiede
dc.subject.otherphysical unclonable functionsen
dc.subject.otherprivate authenticationen
dc.subject.othersecret key generationen
dc.subject.otherinformation theoretic privacyen
dc.subject.othercode constructions for securityen
dc.titleAn Optimality Summary: Secret Key Agreement with Physical Unclonable Functionsen
dc.typeArticleen
dc.date.updated2021-01-08T05:25:26Z-
tub.accessrights.dnbfreeen
tub.publisher.universityorinstitutionTechnische Universität Berlinen
dc.identifier.eissn1099-4300-
dc.type.versionpublishedVersionen
dcterms.bibliographicCitation.doi10.3390/e23010016en
dcterms.bibliographicCitation.journaltitleEntropyen
dcterms.bibliographicCitation.originalpublisherplaceBaselen
dcterms.bibliographicCitation.volume23en
dcterms.bibliographicCitation.originalpublishernameMDPIen
dcterms.bibliographicCitation.issue1en
dcterms.bibliographicCitation.articlenumber16en
tub.affiliationFak. 4 Elektrotechnik und Informatik » Inst. Telekommunikationssysteme » FG Theoretische Grundlagen der Kommunikationstechnikde
Appears in Collections:Technische Universität Berlin » Publications

Files in This Item:
entropy-23-00016-v2.pdf
Format: Adobe PDF | Size: 484.3 kB
DownloadShow Preview
Thumbnail

Item Export Bar

This item is licensed under a Creative Commons License Creative Commons