A PUF-Based Key Storage Scheme Using Fuzzy Vault

被引:1
|
作者
Yang, Jinrong [1 ]
Chen, Shuai [2 ]
Cao, Yuan [3 ]
机构
[1] Wuhan Univ Technol, Sch Comp Sci & Artificial Intelligence, Wuhan 430070, Peoples R China
[2] Binary Semicond Co Ltd, Rock Solid Secur Lab, Suzhou 215000, Peoples R China
[3] Hohai Univ, Collage Internet Things Engn, Changzhou 213022, Peoples R China
关键词
Physical Unclonable Functions; error-tolerant; fuzzy pattern; GENERATE STRONG KEYS; IMPLEMENTATION; BIOMETRICS; EXTRACTORS;
D O I
10.3390/s23073476
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Physical Unclonable Functions (PUFs) are considered attractive low-cost security anchors in the key generation scheme. The helper data algorithm is usually used to transform the fuzzy responses extracted from PUF into a reproducible key. The generated key can be used to encrypt secret data in traditional security schemes. In contrast, this work shows that the fuzzy responses of both weak and strong PUFs can be used to secretly store the important data (e.g., the distributed keys) directly by an error-tolerant algorithm, Fuzzy Vault, without the traditional encryption algorithm and helper data scheme. The locking and unlocking methods of our proposal are designed to leverage the feature of weak and strong PUFs relatively. For the strong PUFs, our proposal is a new train of thought about how to leverage the advantage of strong PUFs (exponential number of challenge-response pairs) when used in the field. The evaluation was performed on existing weak PUF and strong PUF designs. The unlocking rate and runtime are tested under different parameters and environments. The test results demonstrate that our proposal can reach a 100% unlocking rate by parameter adjustment with less than 1 second of locking time and a few seconds of unlocking time. Finally, the tradeoff between security, reliability, and overhead of the new proposal is discussed.
引用
收藏
页数:21
相关论文
共 50 条
  • [21] A Secure MQTT Framework from PUF-based Key Establishment
    Shin, SeongHan
    Kobara, Kazukuni
    PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2017, : 1296 - 1301
  • [22] PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator
    Maes, Roel
    Van Herrewege, Anthony
    Verbauwhede, Ingrid
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2012, 2012, 7428 : 302 - 319
  • [23] A New Efficient PUF-Based Mutual Authentication Scheme for Drones
    Ayebie, Edoukou Berenger
    Bou-chaaya, Karam
    Rais, Helmi
    RISKS AND SECURITY OF INTERNET AND SYSTEMS, CRISIS 2023, 2023, 14529 : 67 - 84
  • [24] A Secure PUF-Based Unilateral Authentication Scheme for RFID System
    Pramod Kumar Maurya
    Satya Bagchi
    Wireless Personal Communications, 2018, 103 : 1699 - 1712
  • [25] ANDROID SECURE STORAGE APPLICATION USING FUZZY VAULT-BASED KEY BINDING
    Ghouzali, Sanaa
    Altuwaijri, Haya
    Lafkih, Maryam
    Al-Goblan, Mohammed
    Abdul, Wadood
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2021, 13 (03): : 103 - 114
  • [26] A PUF-Based Low Cost Secure Communication Scheme for IoT
    Li S.-S.
    Huang Y.-C.
    Yu B.
    Bao B.-W.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2019, 47 (04): : 812 - 817
  • [27] A Novel Key Sharing Fuzzy Vault Scheme
    You, Lin
    Wang, Yuna
    Chen, Yulei
    Deng, Qi
    Zhang, Huanhuan
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (09): : 4585 - 4602
  • [28] PUF-Based Fuzzy Authentication Without Error Correcting Codes
    Yan, Wei
    Tehranipoor, Fatemeh
    Chandy, John A.
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2017, 36 (09) : 1445 - 1457
  • [29] An Error Correction Approach to Memristors PUF-based Key Encapsulation
    Korenda, Ashwija Reddy
    Assiri, Sareh
    Afghah, Fatemeh
    Cambou, Bertrand
    2021 IEEE INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS (IEEE COINS 2021), 2021, : 7 - 12
  • [30] PUF-RAKE: A PUF-Based Robust and Lightweight Authentication and Key Establishment Protocol
    Qureshi, Mahmood Azhar
    Munir, Arslan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2457 - 2475