A PUF-Based Key Storage Scheme Using Fuzzy Vault

被引:1
|
作者
Yang, Jinrong [1 ]
Chen, Shuai [2 ]
Cao, Yuan [3 ]
机构
[1] Wuhan Univ Technol, Sch Comp Sci & Artificial Intelligence, Wuhan 430070, Peoples R China
[2] Binary Semicond Co Ltd, Rock Solid Secur Lab, Suzhou 215000, Peoples R China
[3] Hohai Univ, Collage Internet Things Engn, Changzhou 213022, Peoples R China
关键词
Physical Unclonable Functions; error-tolerant; fuzzy pattern; GENERATE STRONG KEYS; IMPLEMENTATION; BIOMETRICS; EXTRACTORS;
D O I
10.3390/s23073476
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Physical Unclonable Functions (PUFs) are considered attractive low-cost security anchors in the key generation scheme. The helper data algorithm is usually used to transform the fuzzy responses extracted from PUF into a reproducible key. The generated key can be used to encrypt secret data in traditional security schemes. In contrast, this work shows that the fuzzy responses of both weak and strong PUFs can be used to secretly store the important data (e.g., the distributed keys) directly by an error-tolerant algorithm, Fuzzy Vault, without the traditional encryption algorithm and helper data scheme. The locking and unlocking methods of our proposal are designed to leverage the feature of weak and strong PUFs relatively. For the strong PUFs, our proposal is a new train of thought about how to leverage the advantage of strong PUFs (exponential number of challenge-response pairs) when used in the field. The evaluation was performed on existing weak PUF and strong PUF designs. The unlocking rate and runtime are tested under different parameters and environments. The test results demonstrate that our proposal can reach a 100% unlocking rate by parameter adjustment with less than 1 second of locking time and a few seconds of unlocking time. Finally, the tradeoff between security, reliability, and overhead of the new proposal is discussed.
引用
下载
收藏
页数:21
相关论文
共 50 条
  • [1] A novel PUF-Based key management scheme for DTMSN
    Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    不详
    J. Convergence Inf. Technol., 2012, 12 (372-381):
  • [2] PUF-Based Key Generation Scheme for Secure Group Communication Using MEMS
    Mehdi, Mubarak
    Ajani, Muhammad Taha
    Tahir, Hasan
    Tahir, Shahzaib
    Alizai, Zahoor
    Khan, Fawad
    Riaz, Qaiser
    Hussain, Mehdi
    ELECTRONICS, 2021, 10 (14)
  • [3] Testing PUF-Based Secure Key Storage Circuits
    Cortez, Mafalda
    Roelofs, Gijs
    Hamdioui, Said
    di Natale, Giorgio
    2014 DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION (DATE), 2014,
  • [4] Testing Methods for PUF-Based Secure Key Storage Circuits
    Cortez, Mafalda
    Roelofs, Gijs
    Hamdioui, Said
    Di Natale, Giorgio
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2014, 30 (05): : 581 - 594
  • [5] Testing Methods for PUF-Based Secure Key Storage Circuits
    Mafalda Cortez
    Gijs Roelofs
    Said Hamdioui
    Giorgio Di Natale
    Journal of Electronic Testing, 2014, 30 : 581 - 594
  • [6] A PUF-based Authentication and Key Distribution Scheme for In-Vehicle Network
    Lai, Chengzhe
    Wang, Xinwei
    Zheng, Dong
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 1591 - 1596
  • [7] Lightweight and secure PUF-based authenticated key agreement scheme for smart grid
    Tahavori, Mahdi
    Moazami, Farokhlagha
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (05) : 1616 - 1628
  • [8] Lightweight and secure PUF-based authenticated key agreement scheme for smart grid
    Mahdi Tahavori
    Farokhlagha Moazami
    Peer-to-Peer Networking and Applications, 2020, 13 : 1616 - 1628
  • [9] PUF-based Authentication Scheme for IoT Devices
    Yoon, Seungyong
    Kim, Byoungkoo
    Kang, Yousung
    Choi, Dooho
    11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 1792 - 1794
  • [10] PUF-based key distribution in wireless sensor networks
    Zhang Z.
    Liu Y.
    Zuo Q.
    Harn L.
    Qiu S.
    Cheng Y.
    Computers, Materials and Continua, 2020, 64 (02): : 1261 - 1280