Optimal Tradeoff of Secure PUF-based Authentication

被引:0
|
作者
Kittichokechai, Kittipong [1 ]
Caire, Giuseppe [1 ]
机构
[1] Tech Univ Berlin, Berlin, Germany
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider a problem of secure PUF-based authentication under a privacy constraint on the PUF responses. Given a randomly chosen challenge, an adversary who has access to the (publicly) stored helper data and side information correlated with the challenge -response pairs may try to mimic the corresponding PUF response in order to get authenticated. We characterize the optimal tradeoff between rate of the compressed helper data, information leakage rate of the PUF response at the adversary, and the adversary's maximum false acceptance probability exponent.. The result captures a tradeoff between authentication performance and security aspects of PUF-based authentication such as authentication security and unpredictability of PUF when used in authentication applications.
引用
收藏
页码:83 / 88
页数:6
相关论文
共 50 条
  • [1] Secure PUF-Based Authentication Systems
    Tun, Naing Win
    Mambo, Masahiro
    [J]. SENSORS, 2024, 24 (16)
  • [2] PUF-Based Authentication
    Che, Wenjie
    Saqib, Fareena
    Plusquellic, Jim
    [J]. 2015 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2015, : 337 - 344
  • [3] Designing secure PUF-based authentication protocols for constrained environments
    Lee, Sang-Woong
    Safkhani, Masoumeh
    Quynh Le
    Ahmed, Omed Hassan
    Hosseinzadeh, Mehdi
    Rahmani, Amir Masoud
    Bagheri, Nasour
    [J]. SCIENTIFIC REPORTS, 2023, 13 (01):
  • [4] A New Secure Scan Design with PUF-based Key for Authentication
    Wang, Qidong
    Cui, Aijiao
    Qu, Gang
    Li, Huawei
    [J]. 2020 IEEE 38TH VLSI TEST SYMPOSIUM (VTS 2020), 2020,
  • [5] A Secure PUF-Based Unilateral Authentication Scheme for RFID System
    Maurya, Pramod Kumar
    Bagchi, Satya
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 103 (02) : 1699 - 1712
  • [6] A Secure PUF-Based Unilateral Authentication Scheme for RFID System
    Pramod Kumar Maurya
    Satya Bagchi
    [J]. Wireless Personal Communications, 2018, 103 : 1699 - 1712
  • [7] Designing secure PUF-based authentication protocols for constrained environments
    Sang-Woong Lee
    Masoumeh Safkhani
    Quynh Le
    Omed Hassan Ahmed
    Mehdi Hosseinzadeh
    Amir Masoud Rahmani
    Nasour Bagheri
    [J]. Scientific Reports, 13 (1)
  • [8] PUF-Based Mutual Multifactor Entity and Transaction Authentication for Secure Banking
    Resende, Amanda C. Davi
    Mochetti, Karina
    Aranha, Diego F.
    [J]. LIGHTWEIGHT CRYPTOGRAPHY FOR SECURITY AND PRIVACY, LIGHTSEC 2015, 2016, 9542 : 77 - 96
  • [9] PUF-Based Authentication Protocols - Revisited
    Busch, Heike
    Katzenbeisser, Stefan
    Baecher, Paul
    [J]. INFORMATION SECURITY APPLICATIONS, 2009, 5932 : 296 - 308
  • [10] A Secure PUF-Based Authentication Protocol for Remote Keyless Entry Systems in Cars
    Parameswarath, Rohini Poolat
    Sikdar, Biplab
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (07) : 9825 - 9838