A PUF-Based Key Storage Scheme Using Fuzzy Vault
Physical Unclonable Functions (PUFs) are considered attractive low-cost security anchors in the key generation scheme. The helper data algorithm is usually used to transform the fuzzy responses extracted from PUF into a reproducible key. The generated key can be used to encrypt secret data in tradit...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-03-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/23/7/3476 |
_version_ | 1827746504815673344 |
---|---|
author | Jinrong Yang Shuai Chen Yuan Cao |
author_facet | Jinrong Yang Shuai Chen Yuan Cao |
author_sort | Jinrong Yang |
collection | DOAJ |
description | Physical Unclonable Functions (PUFs) are considered attractive low-cost security anchors in the key generation scheme. The helper data algorithm is usually used to transform the fuzzy responses extracted from PUF into a reproducible key. The generated key can be used to encrypt secret data in traditional security schemes. In contrast, this work shows that the fuzzy responses of both weak and strong PUFs can be used to secretly store the important data (e.g., the distributed keys) directly by an error-tolerant algorithm, Fuzzy Vault, without the traditional encryption algorithm and helper data scheme. The locking and unlocking methods of our proposal are designed to leverage the feature of weak and strong PUFs relatively. For the strong PUFs, our proposal is a new train of thought about how to leverage the advantage of strong PUFs (exponential number of challenge–response pairs) when used in the field. The evaluation was performed on existing weak PUF and strong PUF designs. The unlocking rate and runtime are tested under different parameters and environments. The test results demonstrate that our proposal can reach a 100% unlocking rate by parameter adjustment with less than 1 second of locking time and a few seconds of unlocking time. Finally, the tradeoff between security, reliability, and overhead of the new proposal is discussed. |
first_indexed | 2024-03-11T05:25:18Z |
format | Article |
id | doaj.art-e7c470a32cff4da0876025700f59ad4c |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-03-11T05:25:18Z |
publishDate | 2023-03-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-e7c470a32cff4da0876025700f59ad4c2023-11-17T17:33:06ZengMDPI AGSensors1424-82202023-03-01237347610.3390/s23073476A PUF-Based Key Storage Scheme Using Fuzzy VaultJinrong Yang0Shuai Chen1Yuan Cao2School of Computer Science and Artificial Intelligence, Wuhan University of Technology, Wuhan 430070, ChinaRock-Solid Security Lab., Binary Semiconductor Co., Ltd., Suzhou 215000, ChinaCollage of Internet of Things Engineering, Hohai University, Changzhou 213022, ChinaPhysical Unclonable Functions (PUFs) are considered attractive low-cost security anchors in the key generation scheme. The helper data algorithm is usually used to transform the fuzzy responses extracted from PUF into a reproducible key. The generated key can be used to encrypt secret data in traditional security schemes. In contrast, this work shows that the fuzzy responses of both weak and strong PUFs can be used to secretly store the important data (e.g., the distributed keys) directly by an error-tolerant algorithm, Fuzzy Vault, without the traditional encryption algorithm and helper data scheme. The locking and unlocking methods of our proposal are designed to leverage the feature of weak and strong PUFs relatively. For the strong PUFs, our proposal is a new train of thought about how to leverage the advantage of strong PUFs (exponential number of challenge–response pairs) when used in the field. The evaluation was performed on existing weak PUF and strong PUF designs. The unlocking rate and runtime are tested under different parameters and environments. The test results demonstrate that our proposal can reach a 100% unlocking rate by parameter adjustment with less than 1 second of locking time and a few seconds of unlocking time. Finally, the tradeoff between security, reliability, and overhead of the new proposal is discussed.https://www.mdpi.com/1424-8220/23/7/3476Physical Unclonable Functionserror-tolerantfuzzy pattern |
spellingShingle | Jinrong Yang Shuai Chen Yuan Cao A PUF-Based Key Storage Scheme Using Fuzzy Vault Sensors Physical Unclonable Functions error-tolerant fuzzy pattern |
title | A PUF-Based Key Storage Scheme Using Fuzzy Vault |
title_full | A PUF-Based Key Storage Scheme Using Fuzzy Vault |
title_fullStr | A PUF-Based Key Storage Scheme Using Fuzzy Vault |
title_full_unstemmed | A PUF-Based Key Storage Scheme Using Fuzzy Vault |
title_short | A PUF-Based Key Storage Scheme Using Fuzzy Vault |
title_sort | puf based key storage scheme using fuzzy vault |
topic | Physical Unclonable Functions error-tolerant fuzzy pattern |
url | https://www.mdpi.com/1424-8220/23/7/3476 |
work_keys_str_mv | AT jinrongyang apufbasedkeystorageschemeusingfuzzyvault AT shuaichen apufbasedkeystorageschemeusingfuzzyvault AT yuancao apufbasedkeystorageschemeusingfuzzyvault AT jinrongyang pufbasedkeystorageschemeusingfuzzyvault AT shuaichen pufbasedkeystorageschemeusingfuzzyvault AT yuancao pufbasedkeystorageschemeusingfuzzyvault |