{"id":"https://openalex.org/W2623770361","doi":"https://doi.org/10.1109/access.2017.2713835","title":"Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things","display_name":"Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2623770361","doi":"https://doi.org/10.1109/access.2017.2713835","mag":"2623770361"},"language":"en","primary_location":{"id":"doi:10.1109/access.2017.2713835","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2017.2713835","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2017.2713835","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026102076","display_name":"Christopher Huth","orcid":"https://orcid.org/0000-0002-1473-1221"},"institutions":[{"id":"https://openalex.org/I889804353","display_name":"Robert Bosch (Germany)","ror":"https://ror.org/01fe0jt45","country_code":"DE","type":"company","lineage":["https://openalex.org/I889804353"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Christopher Huth","raw_affiliation_strings":["Safety, Security, and Privacy Research Group, Robert Bosch Corporate Research, Renningen, Germany"],"raw_orcid":"https://orcid.org/0000-0002-1473-1221","affiliations":[{"raw_affiliation_string":"Safety, Security, and Privacy Research Group, Robert Bosch Corporate Research, Renningen, Germany","institution_ids":["https://openalex.org/I889804353"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048135269","display_name":"Daniela Becker","orcid":"https://orcid.org/0000-0002-4105-7199"},"institutions":[{"id":"https://openalex.org/I4210120115","display_name":"Robert Bosch (United States)","ror":"https://ror.org/02venad53","country_code":"US","type":"company","lineage":["https://openalex.org/I4210120115","https://openalex.org/I889804353"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Daniela Becker","raw_affiliation_strings":["Security and Privacy Group, Research and Technology Center, Robert Bosch LLC, Pittsburgh, PA, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Security and Privacy Group, Research and Technology Center, Robert Bosch LLC, Pittsburgh, PA, USA","institution_ids":["https://openalex.org/I4210120115"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067850571","display_name":"Jorge Guajardo Merchan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210120115","display_name":"Robert Bosch (United States)","ror":"https://ror.org/02venad53","country_code":"US","type":"company","lineage":["https://openalex.org/I4210120115","https://openalex.org/I889804353"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jorge Guajardo Merchan","raw_affiliation_strings":["Security and Privacy Group, Research and Technology Center, Robert Bosch LLC, Pittsburgh, PA, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Security and Privacy Group, Research and Technology Center, Robert Bosch LLC, Pittsburgh, PA, USA","institution_ids":["https://openalex.org/I4210120115"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040596736","display_name":"Paul Duplys","orcid":null},"institutions":[{"id":"https://openalex.org/I889804353","display_name":"Robert Bosch (Germany)","ror":"https://ror.org/01fe0jt45","country_code":"DE","type":"company","lineage":["https://openalex.org/I889804353"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Paul Duplys","raw_affiliation_strings":["Safety, Security, and Privacy Research Group, Robert Bosch Corporate Research, Renningen, Germany"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Safety, Security, and Privacy Research Group, Robert Bosch Corporate Research, Renningen, Germany","institution_ids":["https://openalex.org/I889804353"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076453092","display_name":"Tim G\u00fcneysu","orcid":"https://orcid.org/0000-0002-3293-4989"},"institutions":[{"id":"https://openalex.org/I180437899","display_name":"University of Bremen","ror":"https://ror.org/04ers2y35","country_code":"DE","type":"education","lineage":["https://openalex.org/I180437899"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Tim Guneysu","raw_affiliation_strings":["University of Bremen & DFKI, Bremen, Germany"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Bremen & DFKI, Bremen, Germany","institution_ids":["https://openalex.org/I180437899"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5026102076"],"corresponding_institution_ids":["https://openalex.org/I889804353"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":3.0061,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.92719733,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"5","issue":null,"first_page":"11909","last_page":"11926"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7642485499382019},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.5862492322921753},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.4614149332046509},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.42129045724868774},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4137241840362549},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4006451666355133},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.395469069480896},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3655298948287964},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3643145263195038},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3391200304031372},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17611756920814514}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7642485499382019},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.5862492322921753},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.4614149332046509},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.42129045724868774},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4137241840362549},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4006451666355133},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.395469069480896},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3655298948287964},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3643145263195038},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3391200304031372},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17611756920814514},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2017.2713835","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2017.2713835","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:3347a882f2a949ef94f97932f1511bac","is_oa":true,"landing_page_url":"https://doaj.org/article/3347a882f2a949ef94f97932f1511bac","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 5, Pp 11909-11926 (2017)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2017.2713835","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2017.2713835","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.4099999964237213,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":66,"referenced_works":["https://openalex.org/W104720657","https://openalex.org/W124944822","https://openalex.org/W155540543","https://openalex.org/W196044395","https://openalex.org/W575714383","https://openalex.org/W1505452726","https://openalex.org/W1515671919","https://openalex.org/W1529679142","https://openalex.org/W1553119295","https://openalex.org/W1567573409","https://openalex.org/W1598269861","https://openalex.org/W1606729219","https://openalex.org/W1840841206","https://openalex.org/W1966117405","https://openalex.org/W1972012147","https://openalex.org/W1974821667","https://openalex.org/W2000171858","https://openalex.org/W2007466965","https://openalex.org/W2058785578","https://openalex.org/W2065151783","https://openalex.org/W2070616660","https://openalex.org/W2106970188","https://openalex.org/W2111809688","https://openalex.org/W2113322447","https://openalex.org/W2116374153","https://openalex.org/W2124874986","https://openalex.org/W2129004891","https://openalex.org/W2130351941","https://openalex.org/W2134754504","https://openalex.org/W2138474025","https://openalex.org/W2146813141","https://openalex.org/W2146820445","https://openalex.org/W2158920013","https://openalex.org/W2169212403","https://openalex.org/W2174648984","https://openalex.org/W2181989096","https://openalex.org/W2225497109","https://openalex.org/W2289458927","https://openalex.org/W2291918266","https://openalex.org/W2296201074","https://openalex.org/W2400700555","https://openalex.org/W2401857634","https://openalex.org/W2461769188","https://openalex.org/W2564566221","https://openalex.org/W2769712015","https://openalex.org/W2949231365","https://openalex.org/W2987687226","https://openalex.org/W3028854235","https://openalex.org/W4298419651","https://openalex.org/W6616596072","https://openalex.org/W6630771808","https://openalex.org/W6631914529","https://openalex.org/W6633283044","https://openalex.org/W6633996066","https://openalex.org/W6638869017","https://openalex.org/W6654347880","https://openalex.org/W6676339310","https://openalex.org/W6679357471","https://openalex.org/W6683288649","https://openalex.org/W6684566051","https://openalex.org/W6685981479","https://openalex.org/W6689343174","https://openalex.org/W6696663596","https://openalex.org/W6712681333","https://openalex.org/W6721581569","https://openalex.org/W6746629145"],"related_works":["https://openalex.org/W2770593030","https://openalex.org/W3089171781","https://openalex.org/W3154990682","https://openalex.org/W4281727072","https://openalex.org/W2560201613","https://openalex.org/W2171975302","https://openalex.org/W2154044472","https://openalex.org/W4210772589","https://openalex.org/W3095894856","https://openalex.org/W4248992603"],"abstract_inverted_index":{"With":[0],"the":[1,4,30,34,68,82,89,98,101,130,140,143,146,149],"advent":[2],"of":[3,6,32,59,100,133,142,148,161,166,200],"Internet":[5],"Things,":[7],"lightweight":[8],"devices":[9],"necessitate":[10],"secure":[11,18],"and":[12,125,163,185],"cost-efficient":[13],"key":[14,19,35,50,69,150],"storage.":[15],"Since":[16],"traditional":[17],"storage":[20],"is":[21,91],"expensive,":[22],"novel":[23],"solutions":[24],"have":[25],"been":[26,74],"developed":[27],"based":[28,96],"on":[29,97,151,169],"idea":[31],"deriving":[33],"from":[36],"noisy":[37],"entropy":[38,61,65,83,141,147,205],"sources.":[39],"Such":[40],"sources":[41],"when":[42],"combined":[43],"with":[44,103],"fuzzy":[45,54,109,137],"extractors":[46,55],"allow":[47],"cryptographically":[48],"strong":[49],"derivation.":[51],"Information":[52],"theoretic":[53],"require":[56],"large":[57],"amounts":[58],"input":[60],"to":[62,93,114,195],"account":[63],"for":[64],"loss":[66,84],"in":[67,188,198],"extraction":[70],"process.":[71],"It":[72],"has":[73],"shown":[75],"by":[76],"Fuller":[77],"et":[78],"al.":[79],"(ASIACRYPT'13)":[80],"that":[81],"can":[85,182],"be":[86,183],"reduced":[87],"if":[88],"requirement":[90],"relaxed":[92],"computational":[94,108,136],"security":[95,124],"hardness":[99],"Learning":[102],"Errors":[104],"problem.":[105],"Using":[106],"this":[107],"extractor,":[110,138],"we":[111,174],"show":[112,176],"how":[113,177],"construct":[115],"a":[116,134,152,178],"device-server":[117,179],"authentication":[118,180],"system":[119,181],"providing":[120],"outsider":[121],"chosen":[122],"perturbation":[123],"pre-application":[126],"robustness.":[127],"We":[128,191],"present":[129],"first":[131],"implementation":[132,156,194],"lossless":[135],"where":[139],"source":[144],"equals":[145],"constrained":[153],"device.":[154],"The":[155],"needs":[157],"only":[158],"1.45":[159],"KB":[160,165],"SRAM":[162],"9.8":[164],"Flash":[167],"memory":[168],"an":[170],"8-b":[171],"microcontroller.":[172],"Furthermore,":[173],"also":[175],"constructed":[184],"efficiently":[186],"implemented":[187],"our":[189,193],"system.":[190],"compare":[192],"existing":[196],"work":[197],"terms":[199],"security,":[201],"while":[202],"achieving":[203],"no":[204],"loss.":[206]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":4}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
