Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems

Onur Gunlu, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer

Research output: Contribution to journalArticlepeer-review

16 Citations (Scopus)


The two-terminal key agreement problem with biometric or physical identifiers is considered. Two linear code constructions based on Wyner-Ziv coding are developed. The first construction uses random linear codes and achieves all points of the key-leakage-storage regions of the generated-secret and chosen-secret models. The second construction uses nested polar codes for vector quantization during enrollment and for error correction during reconstruction. The simulation results show that the nested polar codes achieve privacy leakage and storage rates that improve on existing code designs. One proposed code achieves a rate tuple that cannot be achieved by existing methods.

Original languageEnglish
Article number8691487
Pages (from-to)2848-2858
Number of pages11
JournalIEEE Transactions on Information Forensics and Security
Issue number11
Publication statusPublished - Nov 2019
Externally publishedYes


  • Information theoretic security
  • key agreement
  • physical unclonable functions
  • Wyner-Ziv coding


Dive into the research topics of 'Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems'. Together they form a unique fingerprint.

Cite this