Cargando…

A Secure Secret Key Agreement Scheme among Multiple Twinning Superlattice PUF Holders

Modern cryptography attributes the security of a cryptographic system to the security of the key. How to securely distribute the key has always been a bottleneck in key management. This paper proposes a secure group key agreement scheme for multiple parties using a multiple twinning superlattice phy...

Descripción completa

Detalles Bibliográficos
Autores principales: Liu, Jing, Xie, Jianguo, Zhang, Junwei, Liu, Biao, Chen, Xiaoming, Feng, Huamin
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10223279/
https://www.ncbi.nlm.nih.gov/pubmed/37430626
http://dx.doi.org/10.3390/s23104704
_version_ 1785049903575072768
author Liu, Jing
Xie, Jianguo
Zhang, Junwei
Liu, Biao
Chen, Xiaoming
Feng, Huamin
author_facet Liu, Jing
Xie, Jianguo
Zhang, Junwei
Liu, Biao
Chen, Xiaoming
Feng, Huamin
author_sort Liu, Jing
collection PubMed
description Modern cryptography attributes the security of a cryptographic system to the security of the key. How to securely distribute the key has always been a bottleneck in key management. This paper proposes a secure group key agreement scheme for multiple parties using a multiple twinning superlattice physical unclonable function (PUF) that can be synchronized. By sharing the challenge and helper data among multiple twinning superlattice PUF holders, the scheme employs a reusable fuzzy extractor to obtain the key locally. Moreover, adopting public-key encryption encrypts public data for establishing the subgroup key, which provides independent communication for the subgroup. At the same time, when the subgroup membership changes, the public key encrypts new public data to update the subgroup key, forming scalable group communication. This paper also presents a cost and formal security analysis, which shows that the proposed scheme can achieve computational security by applying the key obtained by the computationally secure reusable fuzzy extractor to the EAV-secure symmetric-key encryption, which has indistinguishable encryption in the presence of an eavesdropper. Additionally, the scheme is secure against physical attacks, man-in-the-middle attacks, and machine learning modeling attacks.
format Online
Article
Text
id pubmed-10223279
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-102232792023-05-28 A Secure Secret Key Agreement Scheme among Multiple Twinning Superlattice PUF Holders Liu, Jing Xie, Jianguo Zhang, Junwei Liu, Biao Chen, Xiaoming Feng, Huamin Sensors (Basel) Article Modern cryptography attributes the security of a cryptographic system to the security of the key. How to securely distribute the key has always been a bottleneck in key management. This paper proposes a secure group key agreement scheme for multiple parties using a multiple twinning superlattice physical unclonable function (PUF) that can be synchronized. By sharing the challenge and helper data among multiple twinning superlattice PUF holders, the scheme employs a reusable fuzzy extractor to obtain the key locally. Moreover, adopting public-key encryption encrypts public data for establishing the subgroup key, which provides independent communication for the subgroup. At the same time, when the subgroup membership changes, the public key encrypts new public data to update the subgroup key, forming scalable group communication. This paper also presents a cost and formal security analysis, which shows that the proposed scheme can achieve computational security by applying the key obtained by the computationally secure reusable fuzzy extractor to the EAV-secure symmetric-key encryption, which has indistinguishable encryption in the presence of an eavesdropper. Additionally, the scheme is secure against physical attacks, man-in-the-middle attacks, and machine learning modeling attacks. MDPI 2023-05-12 /pmc/articles/PMC10223279/ /pubmed/37430626 http://dx.doi.org/10.3390/s23104704 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Liu, Jing
Xie, Jianguo
Zhang, Junwei
Liu, Biao
Chen, Xiaoming
Feng, Huamin
A Secure Secret Key Agreement Scheme among Multiple Twinning Superlattice PUF Holders
title A Secure Secret Key Agreement Scheme among Multiple Twinning Superlattice PUF Holders
title_full A Secure Secret Key Agreement Scheme among Multiple Twinning Superlattice PUF Holders
title_fullStr A Secure Secret Key Agreement Scheme among Multiple Twinning Superlattice PUF Holders
title_full_unstemmed A Secure Secret Key Agreement Scheme among Multiple Twinning Superlattice PUF Holders
title_short A Secure Secret Key Agreement Scheme among Multiple Twinning Superlattice PUF Holders
title_sort secure secret key agreement scheme among multiple twinning superlattice puf holders
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10223279/
https://www.ncbi.nlm.nih.gov/pubmed/37430626
http://dx.doi.org/10.3390/s23104704
work_keys_str_mv AT liujing asecuresecretkeyagreementschemeamongmultipletwinningsuperlatticepufholders
AT xiejianguo asecuresecretkeyagreementschemeamongmultipletwinningsuperlatticepufholders
AT zhangjunwei asecuresecretkeyagreementschemeamongmultipletwinningsuperlatticepufholders
AT liubiao asecuresecretkeyagreementschemeamongmultipletwinningsuperlatticepufholders
AT chenxiaoming asecuresecretkeyagreementschemeamongmultipletwinningsuperlatticepufholders
AT fenghuamin asecuresecretkeyagreementschemeamongmultipletwinningsuperlatticepufholders
AT liujing securesecretkeyagreementschemeamongmultipletwinningsuperlatticepufholders
AT xiejianguo securesecretkeyagreementschemeamongmultipletwinningsuperlatticepufholders
AT zhangjunwei securesecretkeyagreementschemeamongmultipletwinningsuperlatticepufholders
AT liubiao securesecretkeyagreementschemeamongmultipletwinningsuperlatticepufholders
AT chenxiaoming securesecretkeyagreementschemeamongmultipletwinningsuperlatticepufholders
AT fenghuamin securesecretkeyagreementschemeamongmultipletwinningsuperlatticepufholders