• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

最优性总结:基于物理不可克隆函数的密钥协商

An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions.

作者信息

Günlü Onur, Schaefer Rafael

机构信息

Information Theory and Applications Chair, Technische Universität Berlin, 10623 Berlin, Germany.

出版信息

Entropy (Basel). 2020 Dec 24;23(1):16. doi: 10.3390/e23010016.

DOI:10.3390/e23010016
PMID:33374486
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7824005/
Abstract

We address security and privacy problems for digital devices and biometrics from an information-theoretic optimality perspective to conduct authentication, message encryption/decryption, identification or secure and private computations by using a secret key. A physical unclonable function (PUF) provides local security to digital devices and this review gives the most relevant summary for information theorists, coding theorists, and signal processing community members who are interested in optimal PUF constructions. Low-complexity signal processing methods are applied to simplify information-theoretic analyses. The best trade-offs between the privacy-leakage, secret-key, and storage rates are discussed. Proposed optimal constructions that jointly design the vector quantizer and error-correction code parameters are listed. These constructions include modern and algebraic codes such as polar codes and convolutional codes, both of which can achieve small block-error probabilities at short block lengths, corresponding to a small number of PUF circuits. Open problems in the PUF literature from signal processing, information theory, coding theory, and hardware complexity perspectives and their combinations are listed to stimulate further advancements in the research on local privacy and security.

摘要

我们从信息论最优性的角度探讨数字设备和生物特征识别的安全与隐私问题,以便通过使用密钥进行身份验证、消息加密/解密、识别或安全私密计算。物理不可克隆函数(PUF)为数字设备提供本地安全性,本综述为对最优PUF构造感兴趣的信息论学家、编码理论家及信号处理领域的研究人员提供了最相关的总结。应用低复杂度信号处理方法简化信息论分析。讨论了隐私泄露、密钥和存储速率之间的最佳权衡。列出了联合设计矢量量化器和纠错码参数的最优构造方案。这些构造方案包括诸如极化码和卷积码等现代码和代数码,它们在短码长时都能实现较小的误块率,这对应于少量的PUF电路。从信号处理、信息论、编码理论及硬件复杂度的角度及其组合,列出了PUF文献中的开放性问题,以推动本地隐私和安全研究的进一步发展。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91f2/7824005/98e3514bf5f6/entropy-23-00016-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91f2/7824005/6929ca3ece36/entropy-23-00016-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91f2/7824005/fd181a002849/entropy-23-00016-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91f2/7824005/fb7a19a58f33/entropy-23-00016-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91f2/7824005/1e9858371943/entropy-23-00016-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91f2/7824005/758882a38eb5/entropy-23-00016-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91f2/7824005/8199f72a80dd/entropy-23-00016-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91f2/7824005/096cde0c28d4/entropy-23-00016-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91f2/7824005/3a6dfa6991e8/entropy-23-00016-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91f2/7824005/7fe693d878a5/entropy-23-00016-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91f2/7824005/98e3514bf5f6/entropy-23-00016-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91f2/7824005/6929ca3ece36/entropy-23-00016-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91f2/7824005/fd181a002849/entropy-23-00016-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91f2/7824005/fb7a19a58f33/entropy-23-00016-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91f2/7824005/1e9858371943/entropy-23-00016-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91f2/7824005/758882a38eb5/entropy-23-00016-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91f2/7824005/8199f72a80dd/entropy-23-00016-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91f2/7824005/096cde0c28d4/entropy-23-00016-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91f2/7824005/3a6dfa6991e8/entropy-23-00016-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91f2/7824005/7fe693d878a5/entropy-23-00016-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/91f2/7824005/98e3514bf5f6/entropy-23-00016-g010.jpg

相似文献

1
An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions.最优性总结:基于物理不可克隆函数的密钥协商
Entropy (Basel). 2020 Dec 24;23(1):16. doi: 10.3390/e23010016.
2
Secure and Reliable Key Agreement with Physical Unclonable Functions.基于物理不可克隆功能的安全可靠密钥协商
Entropy (Basel). 2018 May 3;20(5):340. doi: 10.3390/e20050340.
3
Quality of Security Guarantees for and with Physical Unclonable Functions and Biometric Secrecy Systems.物理不可克隆功能和生物识别保密系统的安全保障质量
Entropy (Basel). 2023 Aug 21;25(8):1243. doi: 10.3390/e25081243.
4
A PUF- and Biometric-Based Lightweight Hardware Solution to Increase Security at Sensor Nodes.基于 PUF 和生物识别技术的轻量级硬件解决方案,可提高传感器节点的安全性。
Sensors (Basel). 2018 Jul 26;18(8):2429. doi: 10.3390/s18082429.
5
A Lightweight RFID Mutual Authentication Protocol with PUF.一种基于物理不可克隆函数的轻量级射频识别相互认证协议。
Sensors (Basel). 2019 Jul 4;19(13):2957. doi: 10.3390/s19132957.
6
Memristive crypto primitive for building highly secure physical unclonable functions.用于构建高度安全的物理不可克隆功能的忆阻密码原语。
Sci Rep. 2015 Aug 4;5:12785. doi: 10.1038/srep12785.
7
Designing secure PUF-based authentication protocols for constrained environments.为受限环境设计基于物理不可克隆函数的安全认证协议。
Sci Rep. 2023 Dec 7;13(1):21702. doi: 10.1038/s41598-023-48464-z.
8
Intrinsic Physical Unclonable Function (PUF) Sensors in Commodity Devices.商用设备中的固有物理不可克隆功能(PUF)传感器。
Sensors (Basel). 2019 May 28;19(11):2428. doi: 10.3390/s19112428.
9
Physically Unclonable Holographic Encryption and Anticounterfeiting Based on the Light Propagation of Complex Medium and Fluorescent Labels.基于复杂介质光传播和荧光标记的物理不可克隆全息加密与防伪
ACS Appl Mater Interfaces. 2024 Jan 17;16(2):2888-2901. doi: 10.1021/acsami.3c14571. Epub 2024 Jan 2.
10
Deep PUF: A Highly Reliable DRAM PUF-Based Authentication for IoT Networks Using Deep Convolutional Neural Networks.深 PUF:一种使用深度卷积神经网络的基于 DRAM PUF 的高度可靠物联网网络认证方法。
Sensors (Basel). 2021 Mar 12;21(6):2009. doi: 10.3390/s21062009.

引用本文的文献

1
Sensing-Assisted Secure Communications over Correlated Rayleigh Fading Channels.相关瑞利衰落信道上的传感辅助安全通信
Entropy (Basel). 2025 Feb 21;27(3):225. doi: 10.3390/e27030225.
2
Cooperative Jamming-Based Physical-Layer Group Secret and Private Key Generation.基于协作干扰的物理层群组秘密与私钥生成
Entropy (Basel). 2024 Sep 4;26(9):758. doi: 10.3390/e26090758.

本文引用的文献

1
Secure and Reliable Key Agreement with Physical Unclonable Functions.基于物理不可克隆功能的安全可靠密钥协商
Entropy (Basel). 2018 May 3;20(5):340. doi: 10.3390/e20050340.