Cargando…
A Secure Secret Key Agreement Scheme among Multiple Twinning Superlattice PUF Holders
Modern cryptography attributes the security of a cryptographic system to the security of the key. How to securely distribute the key has always been a bottleneck in key management. This paper proposes a secure group key agreement scheme for multiple parties using a multiple twinning superlattice phy...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10223279/ https://www.ncbi.nlm.nih.gov/pubmed/37430626 http://dx.doi.org/10.3390/s23104704 |
_version_ | 1785049903575072768 |
---|---|
author | Liu, Jing Xie, Jianguo Zhang, Junwei Liu, Biao Chen, Xiaoming Feng, Huamin |
author_facet | Liu, Jing Xie, Jianguo Zhang, Junwei Liu, Biao Chen, Xiaoming Feng, Huamin |
author_sort | Liu, Jing |
collection | PubMed |
description | Modern cryptography attributes the security of a cryptographic system to the security of the key. How to securely distribute the key has always been a bottleneck in key management. This paper proposes a secure group key agreement scheme for multiple parties using a multiple twinning superlattice physical unclonable function (PUF) that can be synchronized. By sharing the challenge and helper data among multiple twinning superlattice PUF holders, the scheme employs a reusable fuzzy extractor to obtain the key locally. Moreover, adopting public-key encryption encrypts public data for establishing the subgroup key, which provides independent communication for the subgroup. At the same time, when the subgroup membership changes, the public key encrypts new public data to update the subgroup key, forming scalable group communication. This paper also presents a cost and formal security analysis, which shows that the proposed scheme can achieve computational security by applying the key obtained by the computationally secure reusable fuzzy extractor to the EAV-secure symmetric-key encryption, which has indistinguishable encryption in the presence of an eavesdropper. Additionally, the scheme is secure against physical attacks, man-in-the-middle attacks, and machine learning modeling attacks. |
format | Online Article Text |
id | pubmed-10223279 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-102232792023-05-28 A Secure Secret Key Agreement Scheme among Multiple Twinning Superlattice PUF Holders Liu, Jing Xie, Jianguo Zhang, Junwei Liu, Biao Chen, Xiaoming Feng, Huamin Sensors (Basel) Article Modern cryptography attributes the security of a cryptographic system to the security of the key. How to securely distribute the key has always been a bottleneck in key management. This paper proposes a secure group key agreement scheme for multiple parties using a multiple twinning superlattice physical unclonable function (PUF) that can be synchronized. By sharing the challenge and helper data among multiple twinning superlattice PUF holders, the scheme employs a reusable fuzzy extractor to obtain the key locally. Moreover, adopting public-key encryption encrypts public data for establishing the subgroup key, which provides independent communication for the subgroup. At the same time, when the subgroup membership changes, the public key encrypts new public data to update the subgroup key, forming scalable group communication. This paper also presents a cost and formal security analysis, which shows that the proposed scheme can achieve computational security by applying the key obtained by the computationally secure reusable fuzzy extractor to the EAV-secure symmetric-key encryption, which has indistinguishable encryption in the presence of an eavesdropper. Additionally, the scheme is secure against physical attacks, man-in-the-middle attacks, and machine learning modeling attacks. MDPI 2023-05-12 /pmc/articles/PMC10223279/ /pubmed/37430626 http://dx.doi.org/10.3390/s23104704 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Liu, Jing Xie, Jianguo Zhang, Junwei Liu, Biao Chen, Xiaoming Feng, Huamin A Secure Secret Key Agreement Scheme among Multiple Twinning Superlattice PUF Holders |
title | A Secure Secret Key Agreement Scheme among Multiple Twinning Superlattice PUF Holders |
title_full | A Secure Secret Key Agreement Scheme among Multiple Twinning Superlattice PUF Holders |
title_fullStr | A Secure Secret Key Agreement Scheme among Multiple Twinning Superlattice PUF Holders |
title_full_unstemmed | A Secure Secret Key Agreement Scheme among Multiple Twinning Superlattice PUF Holders |
title_short | A Secure Secret Key Agreement Scheme among Multiple Twinning Superlattice PUF Holders |
title_sort | secure secret key agreement scheme among multiple twinning superlattice puf holders |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10223279/ https://www.ncbi.nlm.nih.gov/pubmed/37430626 http://dx.doi.org/10.3390/s23104704 |
work_keys_str_mv | AT liujing asecuresecretkeyagreementschemeamongmultipletwinningsuperlatticepufholders AT xiejianguo asecuresecretkeyagreementschemeamongmultipletwinningsuperlatticepufholders AT zhangjunwei asecuresecretkeyagreementschemeamongmultipletwinningsuperlatticepufholders AT liubiao asecuresecretkeyagreementschemeamongmultipletwinningsuperlatticepufholders AT chenxiaoming asecuresecretkeyagreementschemeamongmultipletwinningsuperlatticepufholders AT fenghuamin asecuresecretkeyagreementschemeamongmultipletwinningsuperlatticepufholders AT liujing securesecretkeyagreementschemeamongmultipletwinningsuperlatticepufholders AT xiejianguo securesecretkeyagreementschemeamongmultipletwinningsuperlatticepufholders AT zhangjunwei securesecretkeyagreementschemeamongmultipletwinningsuperlatticepufholders AT liubiao securesecretkeyagreementschemeamongmultipletwinningsuperlatticepufholders AT chenxiaoming securesecretkeyagreementschemeamongmultipletwinningsuperlatticepufholders AT fenghuamin securesecretkeyagreementschemeamongmultipletwinningsuperlatticepufholders |