Zero-leakage multiple key-binding scenarios for SRAM-PUF systems based on the XOR-Method

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

4 Downloads (Pure)

Samenvatting

We show that the XOR-method based on linear error-correcting codes can be applied to achieve the secret-key capacity of binary-symmetric SRAM-PUFs.
Then we focus on multiple key-bindings. We prove that no information is leaked by all the helper data about a single secret key both in the case where we use the same key all the time and when we use di↵erent keys. The notion of symmetry is crucial in these proofs.
Originele taal-2Engels
TitelProceedings of the 37th WIC Symposium on Information Theory in the Benelux and the 6th Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux, 2016, May 19-20, 2016, Louvain, Louvain-la-Neuve, Belgium
Plaats van productieLeuven
UitgeverijKatholieke Universiteit Leuven
Pagina's120-127
StatusGepubliceerd - 2016

    Vingerafdruk

Citeer dit

Kusters, C. J., Ignatenko, T., & Willems, F. M. J. (2016). Zero-leakage multiple key-binding scenarios for SRAM-PUF systems based on the XOR-Method. In Proceedings of the 37th WIC Symposium on Information Theory in the Benelux and the 6th Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux, 2016, May 19-20, 2016, Louvain, Louvain-la-Neuve, Belgium (blz. 120-127). Leuven: Katholieke Universiteit Leuven.