Abstract—The wiretap channel model is based on two assumptions: (A1) the legitimate transmitter (Alice) is indeed
communicating with the intended receiver (Bob) and not with an eavesdropper (Eve) and (A2) the channel from Alice to Bob
is better than the one from Alice to Eve. This work proposes a protocol with physical unclonable functions (PUFs) as a security
primitive to ensure that the two assumptions hold in practice.Furthermore, an implementation shows the feasibility of the
concepts. To achieve semantic security in the wiretap channel, we use a seeded modular coding scheme for physical layer security
(PLS).
«
Abstract—The wiretap channel model is based on two assumptions: (A1) the legitimate transmitter (Alice) is indeed
communicating with the intended receiver (Bob) and not with an eavesdropper (Eve) and (A2) the channel from Alice to Bob
is better than the one from Alice to Eve. This work proposes a protocol with physical unclonable functions (PUFs) as a security
primitive to ensure that the two assumptions hold in practice.Furthermore, an implementation shows the feasibility of the
concepts. T...
»