Secret Key Agreement with Physical Unclonable Functions: An Optimality
Summary
- URL: http://arxiv.org/abs/2012.08924v1
- Date: Wed, 16 Dec 2020 13:21:20 GMT
- Title: Secret Key Agreement with Physical Unclonable Functions: An Optimality
Summary
- Authors: Onur G\"unl\"u and Rafael F. Schaefer
- Abstract summary: A physical unclonable function (PUF) is a promising solution for local security in digital devices.
Low-complexity signal processing methods are discussed to make the information-theoretic analysis tractable.
Proposed optimal code constructions that jointly design the vector quantizer and error-correction code parameters are listed.
- Score: 29.438154152702758
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: We address security and privacy problems for digital devices and biometrics
from an information-theoretic optimality perspective, where a secret key is
generated for authentication, identification, message encryption/decryption, or
secure computations. A physical unclonable function (PUF) is a promising
solution for local security in digital devices and this review gives the most
relevant summary for information theorists, coding theorists, and signal
processing community members who are interested in optimal PUF constructions.
Low-complexity signal processing methods such as transform coding that are
developed to make the information-theoretic analysis tractable are discussed.
The optimal trade-offs between the secret-key, privacy-leakage, and storage
rates for multiple PUF measurements are given. Proposed optimal code
constructions that jointly design the vector quantizer and error-correction
code parameters are listed. These constructions include modern and algebraic
codes such as polar codes and convolutional codes, both of which can achieve
small block-error probabilities at short block lengths, corresponding to a
small number of PUF circuits. Open problems in the PUF literature from a signal
processing, information theory, coding theory, and hardware complexity
perspectives and their combinations are listed to stimulate further
advancements in the research on local privacy and security.
Related papers
- HexaCoder: Secure Code Generation via Oracle-Guided Synthetic Training Data [60.75578581719921]
Large language models (LLMs) have shown great potential for automatic code generation.
Recent studies highlight that many LLM-generated code contains serious security vulnerabilities.
We introduce HexaCoder, a novel approach to enhance the ability of LLMs to generate secure codes.
arXiv Detail & Related papers (2024-09-10T12:01:43Z) - Unlocking Potential Binders: Multimodal Pretraining DEL-Fusion for Denoising DNA-Encoded Libraries [51.72836644350993]
Multimodal Pretraining DEL-Fusion model (MPDF)
We develop pretraining tasks applying contrastive objectives between different compound representations and their text descriptions.
We propose a novel DEL-fusion framework that amalgamates compound information at the atomic, submolecular, and molecular levels.
arXiv Detail & Related papers (2024-09-07T17:32:21Z) - Factor Graph Optimization of Error-Correcting Codes for Belief Propagation Decoding [62.25533750469467]
Low-Density Parity-Check (LDPC) codes possess several advantages over other families of codes.
The proposed approach is shown to outperform the decoding performance of existing popular codes by orders of magnitude.
arXiv Detail & Related papers (2024-06-09T12:08:56Z) - Privacy-aware Berrut Approximated Coded Computing for Federated Learning [1.2084539012992408]
We propose a solution to guarantee privacy in Federated Learning schemes.
Our proposal is based on the Berrut Approximated Coded Computing, adapted to a Secret Sharing configuration.
arXiv Detail & Related papers (2024-05-02T20:03:13Z) - Modeling Linear and Non-linear Layers: An MILP Approach Towards Finding Differential and Impossible Differential Propagations [1.5327660568487471]
We introduce an automatic tool for exploring differential and impossible propagations within a cipher.
The tool is successfully applied to five lightweight block ciphers: Lilliput, GIFT64, SKINNY64, Klein, and M.IBS.
arXiv Detail & Related papers (2024-05-01T10:48:23Z) - Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information [53.85237314348328]
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC)
We show that NU-HUNCC is information-theoretic individually secured against an eavesdropper with access to any subset of the links.
arXiv Detail & Related papers (2024-02-13T12:12:39Z) - Deep Learning Assisted Multiuser MIMO Load Modulated Systems for
Enhanced Downlink mmWave Communications [68.96633803796003]
This paper is focused on multiuser load modulation arrays (MU-LMAs) which are attractive due to their low system complexity and reduced cost for millimeter wave (mmWave) multi-input multi-output (MIMO) systems.
The existing precoding algorithm for downlink MU-LMA relies on a sub-array structured (SAS) transmitter which may suffer from decreased degrees of freedom and complex system configuration.
In this paper, we conceive an MU-LMA system employing a full-array structured (FAS) transmitter and propose two algorithms accordingly.
arXiv Detail & Related papers (2023-11-08T08:54:56Z) - Analog information decoding of bosonic quantum LDPC codes [3.34006871348377]
We propose novel decoding methods that explicitly exploit the syndrome information obtained from a bosonic qubit readout.
Our results lay the foundation for general decoding algorithms using analog information and demonstrate promising results in the direction of fault-tolerant quantum computation.
arXiv Detail & Related papers (2023-11-02T15:41:03Z) - PEOPL: Characterizing Privately Encoded Open Datasets with Public Labels [59.66777287810985]
We introduce information-theoretic scores for privacy and utility, which quantify the average performance of an unfaithful user.
We then theoretically characterize primitives in building families of encoding schemes that motivate the use of random deep neural networks.
arXiv Detail & Related papers (2023-03-31T18:03:53Z) - Security analysis method for practical quantum key distribution with
arbitrary encoding schemes [7.321809883860193]
We propose a security analysis method without restriction on encoding schemes.
We illustrate its ability by analyzing source flaws and a high-dimensional asymmetric protocol.
Our work has the potential to become a reference standard for the security analysis of practical QKD.
arXiv Detail & Related papers (2021-09-10T09:53:33Z) - Efficient CNN Building Blocks for Encrypted Data [6.955451042536852]
Homomorphic Encryption (FHE) is a promising technique to enable machine learning and inferencing.
We show that operational parameters of the chosen FHE scheme have a major impact on the design of the machine learning model.
Our empirical study shows that choice of aforementioned design parameters result in significant trade-offs between accuracy, security level, and computational time.
arXiv Detail & Related papers (2021-01-30T21:47:23Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.