Zero secrecy leakage for multiple enrollments of physical unclonable functions

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

22 Downloads (Pure)

Abstract

We use physical unclonable functions (PUFs) to generate secret keys. We analyze the performance of the helper data scheme when the enrollment process is repeated multiple times. We show that codes exist such that the scheme remains secure after two enrollments, when all PUF observations are performed over the same channel. Furthermore, we show that a fuzzy commitment scheme remains secure after any number of enrollments, for PUF sources that meet a certain symmetry condition. We show that the temperature dependent model for SRAM-PUF meets this symmetry condition. Furthermore, we argue that many source-channel model pairs exist that meet the symmetry condition, and give some examples.
Original languageEnglish
Title of host publicationProceedings of the 2018 Symposium on Information Theory and Signal Processing in the Benelux, 31 May - 1 June 2018, Enschede, The Netherlands
Place of PublicationEnschede
PublisherTwente University
Pages119-127
ISBN (Print)978-90-365-4570-9
Publication statusPublished - 2018
EventSymposium of Information Theory and Signal Processing in the Benelux - Enschede, Netherlands
Duration: 31 May 20181 Jun 2018

Conference

ConferenceSymposium of Information Theory and Signal Processing in the Benelux
CountryNetherlands
CityEnschede
Period31/05/181/06/18

    Fingerprint

Cite this

Kusters, C. J., Günlü, O., & Willems, F. M. J. (2018). Zero secrecy leakage for multiple enrollments of physical unclonable functions. In Proceedings of the 2018 Symposium on Information Theory and Signal Processing in the Benelux, 31 May - 1 June 2018, Enschede, The Netherlands (pp. 119-127). Enschede: Twente University.