We use physical unclonable functions (PUFs) to generate secret keys. We analyze the performance of the helper data scheme when the enrollment process is repeated multiple times. We show that codes exist such that the scheme remains secure after two enrollments, when all PUF observations are performed over the same channel. Furthermore, we show that a fuzzy commitment scheme remains secure after any number of enrollments, for PUF sources that meet a certain symmetry condition. We show that the temperature dependent model for SRAM-PUF meets this symmetry condition. Furthermore, we argue that many source-channel model pairs exist that meet the symmetry condition, and give some examples.
|Title of host publication||Proceedings of the 2018 Symposium on Information Theory and Signal Processing in the Benelux, 31 May - 1 June 2018, Enschede, The Netherlands|
|Place of Publication||Enschede|
|Publication status||Published - 2018|
|Event||Symposium of Information Theory and Signal Processing in the Benelux - Enschede, Netherlands|
Duration: 31 May 2018 → 1 Jun 2018
|Conference||Symposium of Information Theory and Signal Processing in the Benelux|
|Period||31/05/18 → 1/06/18|
Kusters, C. J., Günlü, O., & Willems, F. M. J. (2018). Zero secrecy leakage for multiple enrollments of physical unclonable functions. In Proceedings of the 2018 Symposium on Information Theory and Signal Processing in the Benelux, 31 May - 1 June 2018, Enschede, The Netherlands (pp. 119-127). Enschede: Twente University.