Next Article in Journal
On the Interactive Capacity of Finite-State Protocols
Next Article in Special Issue
The Entropy Universe
Previous Article in Journal
Overlapping Community Detection Based on Membership Degree Propagation
Previous Article in Special Issue
A Survey of Information Entropy Metrics for Complex Networks
Review

An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions

Information Theory and Applications Chair, Technische Universität Berlin, 10623 Berlin, Germany
*
Author to whom correspondence should be addressed.
Entropy 2021, 23(1), 16; https://doi.org/10.3390/e23010016
Received: 4 November 2020 / Revised: 5 December 2020 / Accepted: 16 December 2020 / Published: 24 December 2020
(This article belongs to the Special Issue Review Papers for Entropy)
We address security and privacy problems for digital devices and biometrics from an information-theoretic optimality perspective to conduct authentication, message encryption/decryption, identification or secure and private computations by using a secret key. A physical unclonable function (PUF) provides local security to digital devices and this review gives the most relevant summary for information theorists, coding theorists, and signal processing community members who are interested in optimal PUF constructions. Low-complexity signal processing methods are applied to simplify information-theoretic analyses. The best trade-offs between the privacy-leakage, secret-key, and storage rates are discussed. Proposed optimal constructions that jointly design the vector quantizer and error-correction code parameters are listed. These constructions include modern and algebraic codes such as polar codes and convolutional codes, both of which can achieve small block-error probabilities at short block lengths, corresponding to a small number of PUF circuits. Open problems in the PUF literature from signal processing, information theory, coding theory, and hardware complexity perspectives and their combinations are listed to stimulate further advancements in the research on local privacy and security. View Full-Text
Keywords: physical unclonable functions (PUFs); private authentication; secret key generation; information theoretic privacy; code constructions for security physical unclonable functions (PUFs); private authentication; secret key generation; information theoretic privacy; code constructions for security
Show Figures

Figure 1

MDPI and ACS Style

Günlü, O.; Schaefer, R.F. An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions. Entropy 2021, 23, 16. https://doi.org/10.3390/e23010016

AMA Style

Günlü O, Schaefer RF. An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions. Entropy. 2021; 23(1):16. https://doi.org/10.3390/e23010016

Chicago/Turabian Style

Günlü, Onur, and Rafael F. Schaefer 2021. "An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions" Entropy 23, no. 1: 16. https://doi.org/10.3390/e23010016

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop