Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications

@inproceedings{Delvaux2016EfficientFE,
  title={Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications},
  author={J. Delvaux and D. Gu and I. Verbauwhede and M. Hiller and M. Yu},
  booktitle={CHES},
  year={2016}
}
  • J. Delvaux, D. Gu, +2 authors M. Yu
  • Published in CHES 2016
  • Computer Science
  • The device-unique response of a physically unclonable function (PUF) can serve as the root of trust in an embedded cryptographic system. Fuzzy extractors transform this noisy non-uniformly distributed secret into a stable high-entropy key. The overall efficiency thereof, typically depending on error-correction with a binary [n, k, d] block code, is determined by the universal and well-known \((n-k)\) bound on the min-entropy loss. We derive new considerably tighter bounds for PUF-induced… CONTINUE READING
    56 Citations
    Eliminating Leakage in Reverse Fuzzy Extractors
    • 13
    • PDF
    Lightweight (Reverse) Fuzzy Extractor With Multiple Reference PUF Responses
    • 10
    • Highly Influenced
    • PDF
    Algebraic Security Analysis of Key Generation with Physical Unclonable Functions
    • 4
    • PDF
    Efficient Bound for Conditional Min-Entropy of Physical Unclonable Functions Beyond IID
    • 1
    • Highly Influenced
    • PDF
    An Improved Analysis of Reliability and Entropy for Delay PUFs
    • 13
    • PDF
    Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory versus Practice
    • G. T. Becker
    • Computer Science
    • IEEE Transactions on Dependable and Secure Computing
    • 2019
    • 11
    • PDF
    Security, Privacy, and Applied Cryptography Engineering
    • 3
    On the Encryption of the Challenge in Physically Unclonable Functions
    • 4

    References

    SHOWING 1-10 OF 54 REFERENCES
    Entropy loss in PUF-based key generation schemes: The repetition code pitfall
    • 46
    • PDF
    Secure Key Generation from Biased PUFs
    • 70
    • PDF
    Secure key generation from biased PUFs: extended version
    • 25
    • Highly Influential
    Cryptographie key generation from PUF data using efficient fuzzy extractors
    • 51
    • PDF
    Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis
    • 141
    • PDF
    End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol
    • 55
    • PDF
    Read-Proof Hardware from Protective Coatings
    • 392
    • PDF
    An efficient reliable PUF-based cryptographic key generator in 65nm CMOS
    • M. Bhargava, K. Mai
    • Computer Science
    • 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE)
    • 2014
    • 70
    • PDF