2017
DOI: 10.1109/access.2017.2713835
|View full text |Cite
|
Sign up to set email alerts
|

Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(14 citation statements)
references
References 26 publications
0
14
0
Order By: Relevance
“…This approach raises the risk of endangering future communications if the key gets compromised or leaked to an adversary. Alternatively, as suggested in [27], a fuzzy extractor can be employed for the key generation. Nevertheless, solutions based on fiducial points like R-peaks in ECG or PPG signals are not secure from adversaries who can infer that peaks from a long distance [24].…”
Section: A Authenticationmentioning
confidence: 99%
“…This approach raises the risk of endangering future communications if the key gets compromised or leaked to an adversary. Alternatively, as suggested in [27], a fuzzy extractor can be employed for the key generation. Nevertheless, solutions based on fiducial points like R-peaks in ECG or PPG signals are not secure from adversaries who can infer that peaks from a long distance [24].…”
Section: A Authenticationmentioning
confidence: 99%
“…In the literature, FPGA as an embedded processing unit is mainly preferred for generating true random numbers using optical entropy sources due to its up to 343 Gbps throughput capabilities [34]. However, the number of reported random number generators for low-cost low-power embedded systems are highly limited in the literature [27,28,[35][36][37]. These implementations are designed mostly for obtaining high-entropy keys [35].…”
Section: Related Workmentioning
confidence: 99%
“…The strong number generation is required not only for high-performance systems, but it is also a necessity for low-cost electronic systems where data security is critical; such as data logging, smart locks [25] and low data rate wireless communication systems for IoT [26]. On the other hand, for such low-cost embedded system applications in which the hardware resources are limited, it is a challenge to create a random number generator both strongly secure and resource-efficient [27,28]. These systems are generally battery-powered and lack high computing power.…”
Section: Introductionmentioning
confidence: 99%
“…This reduces the decoding complexity on-chip, while the hardness of the problem remains unchanged for the attacker. Another implementation can be found in [63].…”
Section: Fuzzy Commitmentmentioning
confidence: 99%