A Novel Key Generation Scheme Using Quaternary PUF Responses and Wiretap Polar Coding

02/20/2021
by   Yonghong Bai, et al.
0

Physical unclonable functions (PUFs) are widely considered in secret key generation for resource constrained devices. However, PUFs require additional hardware overhead. In this paper, we focus on developing a PUF-efficient, robust, and secure key generation scheme. First, a novel method for extracting quaternary PUF responses is proposed to increase the entropy of a PUF response, in which a 2-bit response is extracted from evaluating a single PUF cell multiple times. The probability masses of the responses can be adjusted by setting parameters appropriately. Then, a chosen secret model based fuzzy extractor (FE) is designed to extract secret keys from the quaternary PUF responses. To improve the security of this FE, it is modeled as a wiretap channel system, and wiretap polar coding is adopted to reduce secrecy leakage. An upper bound of secrecy leakage is also given in this paper, and it suggests that an arbitrarily small (even zero) leakage can be achieved by properly choosing parameters of the quaternary PUF responses generation. Comparison results show that the required number of PUF cells to achieve the same level of secrecy in our scheme is as low as half that of the state-of-the-art schemes.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/17/2018

A Secret Key Generation Scheme for Internet of Things using Ternary-States ReRAM-based Physical Unclonable Functions

Some of the main challenges towards utilizing conventional cryptographic...
research
02/26/2020

Secure and Reliable Key Agreement with Physical Unclonable Functions

Different transforms used in binding a secret key to correlated physical...
research
10/17/2021

Novel Secret-Key-Assisted Schemes for Secure MISOME-OFDM Systems

We propose a new secure transmission scheme for uplink multiple-input si...
research
05/17/2020

Multi-Entity and Multi-Enrollment Key Agreement with Correlated Noise

A basic model for key agreement with a remote (or hidden) source is exte...
research
07/09/2018

Active Secure Coding Based on Eavesdropper Behavior Learning

The secrecy capacity achieving problem of the wiretap channel against an...
research
08/17/2023

New Properties of Intrinsic Information and Their Relation to Bound Secrecy

The secret-key rate measures the rate at which Alice and Bob can extract...
research
11/04/2017

Secure Communications using Nonlinear Silicon Photonic Keys

We present a secure communication system constructed using pairs of nonl...

Please sign up or login with your details

Forgot password? Click here to reset