Projects per year
Abstract
We use physical unclonable functions (PUFs) to generate secret keys. We analyze the performance of the helper data scheme when the enrollment process is repeated multiple times. We show that codes exist such that the scheme remains secure after two enrollments, when all PUF observations are performed over the same channel. Furthermore, we show that a fuzzy commitment scheme remains secure after any number of enrollments, for PUF sources that meet a certain symmetry condition. We show that the temperature dependent model for SRAM-PUF meets this symmetry condition. Furthermore, we argue that many source-channel model pairs exist that meet the symmetry condition, and give some examples.
Original language | English |
---|---|
Title of host publication | Proceedings of the 2018 Symposium on Information Theory and Signal Processing in the Benelux, 31 May - 1 June 2018, Enschede, The Netherlands |
Place of Publication | Enschede |
Publisher | Twente University |
Pages | 119-127 |
ISBN (Print) | 978-90-365-4570-9 |
Publication status | Published - 2018 |
Event | Symposium of Information Theory and Signal Processing in the Benelux - Enschede, Netherlands Duration: 31 May 2018 → 1 Jun 2018 |
Conference
Conference | Symposium of Information Theory and Signal Processing in the Benelux |
---|---|
Country/Territory | Netherlands |
City | Enschede |
Period | 31/05/18 → 1/06/18 |
Fingerprint
Dive into the research topics of 'Zero secrecy leakage for multiple enrollments of physical unclonable functions'. Together they form a unique fingerprint.Projects
- 1 Finished
-
RESCURE: Retrofit Security for Critical infrastructures
Willems, F. M. J., Kusters, C. J., Keijzers, A., Sanders, R., Alvarado, A., Barreiro, A., Croes, S. & de Jonge, M.
1/02/18 → 31/01/20
Project: Research direct