Abstract
Original language | English |
---|---|
Title of host publication | Proceedings of the 2018 Symposium on Information Theory and Signal Processing in the Benelux, 31 May - 1 June 2018, Enschede, The Netherlands |
Place of Publication | Enschede |
Publisher | Twente University |
Pages | 119-127 |
ISBN (Print) | 978-90-365-4570-9 |
Publication status | Published - 2018 |
Event | Symposium of Information Theory and Signal Processing in the Benelux - Enschede, Netherlands Duration: 31 May 2018 → 1 Jun 2018 |
Conference
Conference | Symposium of Information Theory and Signal Processing in the Benelux |
---|---|
Country | Netherlands |
City | Enschede |
Period | 31/05/18 → 1/06/18 |
Fingerprint
Cite this
}
Zero secrecy leakage for multiple enrollments of physical unclonable functions. / Kusters, C.J.; Günlü, O.; Willems, F.M.J.
Proceedings of the 2018 Symposium on Information Theory and Signal Processing in the Benelux, 31 May - 1 June 2018, Enschede, The Netherlands. Enschede : Twente University, 2018. p. 119-127.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
TY - GEN
T1 - Zero secrecy leakage for multiple enrollments of physical unclonable functions
AU - Kusters, C.J.
AU - Günlü, O.
AU - Willems, F.M.J.
PY - 2018
Y1 - 2018
N2 - We use physical unclonable functions (PUFs) to generate secret keys. We analyze the performance of the helper data scheme when the enrollment process is repeated multiple times. We show that codes exist such that the scheme remains secure after two enrollments, when all PUF observations are performed over the same channel. Furthermore, we show that a fuzzy commitment scheme remains secure after any number of enrollments, for PUF sources that meet a certain symmetry condition. We show that the temperature dependent model for SRAM-PUF meets this symmetry condition. Furthermore, we argue that many source-channel model pairs exist that meet the symmetry condition, and give some examples.
AB - We use physical unclonable functions (PUFs) to generate secret keys. We analyze the performance of the helper data scheme when the enrollment process is repeated multiple times. We show that codes exist such that the scheme remains secure after two enrollments, when all PUF observations are performed over the same channel. Furthermore, we show that a fuzzy commitment scheme remains secure after any number of enrollments, for PUF sources that meet a certain symmetry condition. We show that the temperature dependent model for SRAM-PUF meets this symmetry condition. Furthermore, we argue that many source-channel model pairs exist that meet the symmetry condition, and give some examples.
UR - https://www.utwente.nl/en/eemcs/sitb2018/sitb2018proceedings.pdf
M3 - Conference contribution
SN - 978-90-365-4570-9
SP - 119
EP - 127
BT - Proceedings of the 2018 Symposium on Information Theory and Signal Processing in the Benelux, 31 May - 1 June 2018, Enschede, The Netherlands
PB - Twente University
CY - Enschede
ER -