A PUF-Based Key Storage Scheme Using Fuzzy Vault

Physical Unclonable Functions (PUFs) are considered attractive low-cost security anchors in the key generation scheme. The helper data algorithm is usually used to transform the fuzzy responses extracted from PUF into a reproducible key. The generated key can be used to encrypt secret data in tradit...

Full description

Bibliographic Details
Main Authors: Jinrong Yang, Shuai Chen, Yuan Cao
Format: Article
Language:English
Published: MDPI AG 2023-03-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/23/7/3476
_version_ 1827746504815673344
author Jinrong Yang
Shuai Chen
Yuan Cao
author_facet Jinrong Yang
Shuai Chen
Yuan Cao
author_sort Jinrong Yang
collection DOAJ
description Physical Unclonable Functions (PUFs) are considered attractive low-cost security anchors in the key generation scheme. The helper data algorithm is usually used to transform the fuzzy responses extracted from PUF into a reproducible key. The generated key can be used to encrypt secret data in traditional security schemes. In contrast, this work shows that the fuzzy responses of both weak and strong PUFs can be used to secretly store the important data (e.g., the distributed keys) directly by an error-tolerant algorithm, Fuzzy Vault, without the traditional encryption algorithm and helper data scheme. The locking and unlocking methods of our proposal are designed to leverage the feature of weak and strong PUFs relatively. For the strong PUFs, our proposal is a new train of thought about how to leverage the advantage of strong PUFs (exponential number of challenge–response pairs) when used in the field. The evaluation was performed on existing weak PUF and strong PUF designs. The unlocking rate and runtime are tested under different parameters and environments. The test results demonstrate that our proposal can reach a 100% unlocking rate by parameter adjustment with less than 1 second of locking time and a few seconds of unlocking time. Finally, the tradeoff between security, reliability, and overhead of the new proposal is discussed.
first_indexed 2024-03-11T05:25:18Z
format Article
id doaj.art-e7c470a32cff4da0876025700f59ad4c
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-03-11T05:25:18Z
publishDate 2023-03-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-e7c470a32cff4da0876025700f59ad4c2023-11-17T17:33:06ZengMDPI AGSensors1424-82202023-03-01237347610.3390/s23073476A PUF-Based Key Storage Scheme Using Fuzzy VaultJinrong Yang0Shuai Chen1Yuan Cao2School of Computer Science and Artificial Intelligence, Wuhan University of Technology, Wuhan 430070, ChinaRock-Solid Security Lab., Binary Semiconductor Co., Ltd., Suzhou 215000, ChinaCollage of Internet of Things Engineering, Hohai University, Changzhou 213022, ChinaPhysical Unclonable Functions (PUFs) are considered attractive low-cost security anchors in the key generation scheme. The helper data algorithm is usually used to transform the fuzzy responses extracted from PUF into a reproducible key. The generated key can be used to encrypt secret data in traditional security schemes. In contrast, this work shows that the fuzzy responses of both weak and strong PUFs can be used to secretly store the important data (e.g., the distributed keys) directly by an error-tolerant algorithm, Fuzzy Vault, without the traditional encryption algorithm and helper data scheme. The locking and unlocking methods of our proposal are designed to leverage the feature of weak and strong PUFs relatively. For the strong PUFs, our proposal is a new train of thought about how to leverage the advantage of strong PUFs (exponential number of challenge–response pairs) when used in the field. The evaluation was performed on existing weak PUF and strong PUF designs. The unlocking rate and runtime are tested under different parameters and environments. The test results demonstrate that our proposal can reach a 100% unlocking rate by parameter adjustment with less than 1 second of locking time and a few seconds of unlocking time. Finally, the tradeoff between security, reliability, and overhead of the new proposal is discussed.https://www.mdpi.com/1424-8220/23/7/3476Physical Unclonable Functionserror-tolerantfuzzy pattern
spellingShingle Jinrong Yang
Shuai Chen
Yuan Cao
A PUF-Based Key Storage Scheme Using Fuzzy Vault
Sensors
Physical Unclonable Functions
error-tolerant
fuzzy pattern
title A PUF-Based Key Storage Scheme Using Fuzzy Vault
title_full A PUF-Based Key Storage Scheme Using Fuzzy Vault
title_fullStr A PUF-Based Key Storage Scheme Using Fuzzy Vault
title_full_unstemmed A PUF-Based Key Storage Scheme Using Fuzzy Vault
title_short A PUF-Based Key Storage Scheme Using Fuzzy Vault
title_sort puf based key storage scheme using fuzzy vault
topic Physical Unclonable Functions
error-tolerant
fuzzy pattern
url https://www.mdpi.com/1424-8220/23/7/3476
work_keys_str_mv AT jinrongyang apufbasedkeystorageschemeusingfuzzyvault
AT shuaichen apufbasedkeystorageschemeusingfuzzyvault
AT yuancao apufbasedkeystorageschemeusingfuzzyvault
AT jinrongyang pufbasedkeystorageschemeusingfuzzyvault
AT shuaichen pufbasedkeystorageschemeusingfuzzyvault
AT yuancao pufbasedkeystorageschemeusingfuzzyvault