### Abstract

Original language | English |
---|---|

Title of host publication | Proceedings of the 2018 Symposium on Information Theory and Signal Processing in the Benelux, 31 May - 1 June 2018, Enschede, The Netherlands |

Place of Publication | Enschede |

Publisher | Twente University |

Pages | 119-127 |

ISBN (Print) | 978-90-365-4570-9 |

Publication status | Published - 2018 |

Event | Symposium of Information Theory and Signal Processing in the Benelux - Enschede, Netherlands Duration: 31 May 2018 → 1 Jun 2018 |

### Conference

Conference | Symposium of Information Theory and Signal Processing in the Benelux |
---|---|

Country | Netherlands |

City | Enschede |

Period | 31/05/18 → 1/06/18 |

### Fingerprint

### Cite this

*Proceedings of the 2018 Symposium on Information Theory and Signal Processing in the Benelux, 31 May - 1 June 2018, Enschede, The Netherlands*(pp. 119-127). Enschede: Twente University.

}

*Proceedings of the 2018 Symposium on Information Theory and Signal Processing in the Benelux, 31 May - 1 June 2018, Enschede, The Netherlands.*Twente University, Enschede, pp. 119-127, Symposium of Information Theory and Signal Processing in the Benelux, Enschede, Netherlands, 31/05/18.

**Zero secrecy leakage for multiple enrollments of physical unclonable functions.** / Kusters, C.J.; Günlü, O.; Willems, F.M.J.

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review

TY - GEN

T1 - Zero secrecy leakage for multiple enrollments of physical unclonable functions

AU - Kusters, C.J.

AU - Günlü, O.

AU - Willems, F.M.J.

PY - 2018

Y1 - 2018

N2 - We use physical unclonable functions (PUFs) to generate secret keys. We analyze the performance of the helper data scheme when the enrollment process is repeated multiple times. We show that codes exist such that the scheme remains secure after two enrollments, when all PUF observations are performed over the same channel. Furthermore, we show that a fuzzy commitment scheme remains secure after any number of enrollments, for PUF sources that meet a certain symmetry condition. We show that the temperature dependent model for SRAM-PUF meets this symmetry condition. Furthermore, we argue that many source-channel model pairs exist that meet the symmetry condition, and give some examples.

AB - We use physical unclonable functions (PUFs) to generate secret keys. We analyze the performance of the helper data scheme when the enrollment process is repeated multiple times. We show that codes exist such that the scheme remains secure after two enrollments, when all PUF observations are performed over the same channel. Furthermore, we show that a fuzzy commitment scheme remains secure after any number of enrollments, for PUF sources that meet a certain symmetry condition. We show that the temperature dependent model for SRAM-PUF meets this symmetry condition. Furthermore, we argue that many source-channel model pairs exist that meet the symmetry condition, and give some examples.

UR - https://www.utwente.nl/en/eemcs/sitb2018/sitb2018proceedings.pdf

M3 - Conference contribution

SN - 978-90-365-4570-9

SP - 119

EP - 127

BT - Proceedings of the 2018 Symposium on Information Theory and Signal Processing in the Benelux, 31 May - 1 June 2018, Enschede, The Netherlands

PB - Twente University

CY - Enschede

ER -