Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions
@article{Herder2017TrapdoorCF, title={Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions}, author={Charles Herder and Ling Ren and Marten van Dijk and M. Yu and S. Devadas}, journal={IEEE Transactions on Dependable and Secure Computing}, year={2017}, volume={14}, pages={65-82} }
We present a fuzzy extractor whose security can be reduced to the hardness of Learning Parity with Noise (LPN) and can efficiently correct a constant fraction of errors in a biometric source with a “noise-avoiding trapdoor. [...] Key Method The construction is “stateless,” because there is no information stored between subsequent queries, which mitigates attacks against the PUF via tampering. Moreover, our stateless construction corresponds to a PUF whose outputs are free of noise because of internal error…Expand Abstract
Figures, Tables, and Topics from this paper
56 Citations
Lattice PUF: A Strong Physical Unclonable Function Provably Secure against Machine Learning Attacks
- Computer Science
- 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
- 2020
- 2
- PDF
FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise
- Computer Science
- Cryptogr.
- 2017
- 16
- PDF
SHAIP: Secure Hamming Distance for Authentication of Intrinsic PUFs
- Computer Science
- ACM Trans. Design Autom. Electr. Syst.
- 2018
- Highly Influenced
- PDF
TREVERSE: Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs
- Computer Science
- ArXiv
- 2018
- 2
- PDF
Reusable Fuzzy Extractors for Low-Entropy Distributions
- Mathematics, Computer Science
- EUROCRYPT
- 2016
- 65
- PDF
References
SHOWING 1-10 OF 74 REFERENCES
Entropy loss in PUF-based key generation schemes: The repetition code pitfall
- Mathematics, Computer Science
- 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
- 2014
- 46
- PDF
A Formalization of the Security Features of Physical Functions
- Computer Science
- 2011 IEEE Symposium on Security and Privacy
- 2011
- 132
Security analysis of index-based syndrome coding for PUF-based key generation
- Mathematics, Computer Science
- 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
- 2015
- 19
Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Mathematics, Computer Science
- TCC
- 2009
- 461
- PDF
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
- Mathematics, Computer Science
- CRYPTO
- 2009
- 483
- PDF
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning
- Computer Science
- CHES
- 2011
- 93
- PDF
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Computer Science, Mathematics
- SIAM J. Comput.
- 2008
- 1,748
- PDF