Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions

@article{Herder2017TrapdoorCF,
  title={Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions},
  author={Charles Herder and Ling Ren and Marten van Dijk and M. Yu and S. Devadas},
  journal={IEEE Transactions on Dependable and Secure Computing},
  year={2017},
  volume={14},
  pages={65-82}
}
  • Charles Herder, Ling Ren, +2 authors S. Devadas
  • Published 2017
  • Computer Science
  • IEEE Transactions on Dependable and Secure Computing
  • We present a fuzzy extractor whose security can be reduced to the hardness of Learning Parity with Noise (LPN) and can efficiently correct a constant fraction of errors in a biometric source with a “noise-avoiding trapdoor. [...] Key Method The construction is “stateless,” because there is no information stored between subsequent queries, which mitigates attacks against the PUF via tampering. Moreover, our stateless construction corresponds to a PUF whose outputs are free of noise because of internal error…Expand Abstract
    56 Citations
    Lattice PUF: A Strong Physical Unclonable Function Provably Secure against Machine Learning Attacks
    • Ye Wang, X. Xi, M. Orshansky
    • Computer Science
    • 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
    • 2020
    • 2
    • PDF
    FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise
    • 16
    • PDF
    Computational fuzzy extractors
    • 1
    • PDF
    SHAIP: Secure Hamming Distance for Authentication of Intrinsic PUFs
    • Highly Influenced
    • PDF
    TREVERSE: Trial-and-Error Lightweight Secure Reverse Authentication with Simulatable PUFs
    • 2
    • PDF
    Public Key Cryptosystems with Noisy Secret Keys
    • 6
    • PDF
    Reusable Fuzzy Extractors for Low-Entropy Distributions
    • 65
    • PDF

    References

    SHOWING 1-10 OF 74 REFERENCES
    Entropy loss in PUF-based key generation schemes: The repetition code pitfall
    • 46
    • PDF
    A Formalization of the Security Features of Physical Functions
    • 132
    Security analysis of index-based syndrome coding for PUF-based key generation
    • 19
    Secure Remote Authentication Using Biometric Data
    • 234
    • PDF
    Security Based on Physical Unclonability and Disorder
    • 144
    • PDF
    Is Public-Key Encryption Based on LPN Practical?
    • 26