Cargando…
A PUF-Based Key Storage Scheme Using Fuzzy Vault †
Physical Unclonable Functions (PUFs) are considered attractive low-cost security anchors in the key generation scheme. The helper data algorithm is usually used to transform the fuzzy responses extracted from PUF into a reproducible key. The generated key can be used to encrypt secret data in tradit...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10098537/ https://www.ncbi.nlm.nih.gov/pubmed/37050536 http://dx.doi.org/10.3390/s23073476 |
_version_ | 1785024833644396544 |
---|---|
author | Yang, Jinrong Chen, Shuai Cao, Yuan |
author_facet | Yang, Jinrong Chen, Shuai Cao, Yuan |
author_sort | Yang, Jinrong |
collection | PubMed |
description | Physical Unclonable Functions (PUFs) are considered attractive low-cost security anchors in the key generation scheme. The helper data algorithm is usually used to transform the fuzzy responses extracted from PUF into a reproducible key. The generated key can be used to encrypt secret data in traditional security schemes. In contrast, this work shows that the fuzzy responses of both weak and strong PUFs can be used to secretly store the important data (e.g., the distributed keys) directly by an error-tolerant algorithm, Fuzzy Vault, without the traditional encryption algorithm and helper data scheme. The locking and unlocking methods of our proposal are designed to leverage the feature of weak and strong PUFs relatively. For the strong PUFs, our proposal is a new train of thought about how to leverage the advantage of strong PUFs (exponential number of challenge–response pairs) when used in the field. The evaluation was performed on existing weak PUF and strong PUF designs. The unlocking rate and runtime are tested under different parameters and environments. The test results demonstrate that our proposal can reach a 100% unlocking rate by parameter adjustment with less than 1 second of locking time and a few seconds of unlocking time. Finally, the tradeoff between security, reliability, and overhead of the new proposal is discussed. |
format | Online Article Text |
id | pubmed-10098537 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-100985372023-04-14 A PUF-Based Key Storage Scheme Using Fuzzy Vault † Yang, Jinrong Chen, Shuai Cao, Yuan Sensors (Basel) Article Physical Unclonable Functions (PUFs) are considered attractive low-cost security anchors in the key generation scheme. The helper data algorithm is usually used to transform the fuzzy responses extracted from PUF into a reproducible key. The generated key can be used to encrypt secret data in traditional security schemes. In contrast, this work shows that the fuzzy responses of both weak and strong PUFs can be used to secretly store the important data (e.g., the distributed keys) directly by an error-tolerant algorithm, Fuzzy Vault, without the traditional encryption algorithm and helper data scheme. The locking and unlocking methods of our proposal are designed to leverage the feature of weak and strong PUFs relatively. For the strong PUFs, our proposal is a new train of thought about how to leverage the advantage of strong PUFs (exponential number of challenge–response pairs) when used in the field. The evaluation was performed on existing weak PUF and strong PUF designs. The unlocking rate and runtime are tested under different parameters and environments. The test results demonstrate that our proposal can reach a 100% unlocking rate by parameter adjustment with less than 1 second of locking time and a few seconds of unlocking time. Finally, the tradeoff between security, reliability, and overhead of the new proposal is discussed. MDPI 2023-03-26 /pmc/articles/PMC10098537/ /pubmed/37050536 http://dx.doi.org/10.3390/s23073476 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Yang, Jinrong Chen, Shuai Cao, Yuan A PUF-Based Key Storage Scheme Using Fuzzy Vault † |
title | A PUF-Based Key Storage Scheme Using Fuzzy Vault † |
title_full | A PUF-Based Key Storage Scheme Using Fuzzy Vault † |
title_fullStr | A PUF-Based Key Storage Scheme Using Fuzzy Vault † |
title_full_unstemmed | A PUF-Based Key Storage Scheme Using Fuzzy Vault † |
title_short | A PUF-Based Key Storage Scheme Using Fuzzy Vault † |
title_sort | puf-based key storage scheme using fuzzy vault † |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10098537/ https://www.ncbi.nlm.nih.gov/pubmed/37050536 http://dx.doi.org/10.3390/s23073476 |
work_keys_str_mv | AT yangjinrong apufbasedkeystorageschemeusingfuzzyvault AT chenshuai apufbasedkeystorageschemeusingfuzzyvault AT caoyuan apufbasedkeystorageschemeusingfuzzyvault AT yangjinrong pufbasedkeystorageschemeusingfuzzyvault AT chenshuai pufbasedkeystorageschemeusingfuzzyvault AT caoyuan pufbasedkeystorageschemeusingfuzzyvault |