Secure and Reliable Key Agreement with Physical Unclonable Functions

dc.contributor.authorGünlü, Onur
dc.contributor.authorKernetzky, Tasnad
dc.contributor.authorİşcan, Onurcan
dc.contributor.authorSidorenko, Vladimir
dc.contributor.authorKramer, Gerhard
dc.contributor.authorSchaefer, Rafael
dc.date.accessioned2019-08-30T12:27:12Z
dc.date.available2019-08-30T12:27:12Z
dc.date.issued2018-05-03
dc.date.updated2019-07-31T21:34:56Z
dc.description.abstractDifferent transforms used in binding a secret key to correlated physical-identifier outputs are compared. Decorrelation efficiency is the metric used to determine transforms that give highly-uncorrelated outputs. Scalar quantizers are applied to transform outputs to extract uniformly distributed bit sequences to which secret keys are bound. A set of transforms that perform well in terms of the decorrelation efficiency is applied to ring oscillator (RO) outputs to improve the uniqueness and reliability of extracted bit sequences, to reduce the hardware area and information leakage about the key and RO outputs, and to maximize the secret-key length. Low-complexity error-correction codes are proposed to illustrate two complete key-binding systems with perfect secrecy, and better secret-key and privacy-leakage rates than existing methods. A reference hardware implementation is also provided to demonstrate that the transform-coding approach occupies a small hardware area.en
dc.identifier.eissn1099-4300
dc.identifier.urihttps://depositonce.tu-berlin.de/handle/11303/9930
dc.identifier.urihttp://dx.doi.org/10.14279/depositonce-8940
dc.language.isoenen
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/en
dc.subject.ddc000 Informatik, Informationswissenschaft, allgemeine Werkede
dc.subject.otherkey agreementen
dc.subject.otherphysical unclonable functionsen
dc.subject.othertransform codingen
dc.subject.otherprivacy leakageen
dc.subject.otherhardware implementationen
dc.titleSecure and Reliable Key Agreement with Physical Unclonable Functionsen
dc.typeArticleen
dc.type.versionpublishedVersionen
dcterms.bibliographicCitation.articlenumber340en
dcterms.bibliographicCitation.doi10.3390/e20050340en
dcterms.bibliographicCitation.issue5en
dcterms.bibliographicCitation.journaltitleEntropyen
dcterms.bibliographicCitation.originalpublishernameMDPIen
dcterms.bibliographicCitation.originalpublisherplaceBaselen
dcterms.bibliographicCitation.volume20en
tub.accessrights.dnbfreeen
tub.affiliationFak. 4 Elektrotechnik und Informatik::Inst. Telekommunikationssysteme::FG Theoretische Grundlagen der Kommunikationstechnikde
tub.affiliation.facultyFak. 4 Elektrotechnik und Informatikde
tub.affiliation.groupFG Theoretische Grundlagen der Kommunikationstechnikde
tub.affiliation.instituteInst. Telekommunikationssystemede
tub.publisher.universityorinstitutionTechnische Universität Berlinen

Files

Original bundle
Now showing 1 - 1 of 1
Loading…
Thumbnail Image
Name:
entropy-20-00340.pdf
Size:
638.11 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
4.9 KB
Format:
Item-specific license agreed upon to submission
Description:

Collections