Secret-key binding to physical identifiers with reliability guarantees

A joint quantizer and code design is proposed to store secret keys by using fuzzy commitment. Ring oscillators (RO) are used as physical identifiers and transform-coding algorithms to decorrelate the RO outputs. The transform codes are combined with scalar quantizers to satisfy a small block-error probability constraint. The proposed designs are shown to provide perfect secrecy, and smaller privacy-leakage and greater secret-key rates than previously proposed codes.

[1]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[2]  Frans M. J. Willems,et al.  Information Leakage in Fuzzy Commitment Schemes , 2010, IEEE Transactions on Information Forensics and Security.

[3]  Onur Günlü,et al.  Reliable secret key generation from physical unclonable functions under varying environmental conditions , 2015, 2015 IEEE International Workshop on Information Forensics and Security (WIFS).

[4]  Onur Günlü,et al.  Reliable secret-key binding for physical unclonable functions with transform coding , 2016, 2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[5]  Patrick Schaumont,et al.  A large scale characterization of RO-PUF , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[6]  Martin Bossert,et al.  On Error Correction for Physical Unclonable Functions , 2015, ArXiv.

[7]  Yili Hong,et al.  On Computing the Distribution Function for the Sum of Independent and Non-identical Random Indicators Yili Hong , 2011 .

[8]  William K. Pratt,et al.  Scene Adaptive Coder , 1984, IEEE Trans. Commun..

[9]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[10]  Onur Günlü,et al.  DCT based ring oscillator Physical Unclonable Functions , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[11]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[12]  Stephen A. Benton,et al.  Physical one-way functions , 2001 .

[13]  Maximilian Hofer,et al.  Physical Unclonable Functions in Theory and Practice , 2012 .

[14]  Aaron D. Wyner,et al.  A theorem on the entropy of certain binary sequences and applications-I , 1973, IEEE Trans. Inf. Theory.

[15]  G. Edward Suh,et al.  AEGIS: architecture for tamper-evident and tamper-resistant processing , 2003 .

[16]  Frans M. J. Willems,et al.  Privacy-leakage codes for biometric authentication systems , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[17]  Frans M. J. Willems,et al.  Biometric Systems: Privacy and Secrecy Aspects , 2009, IEEE Transactions on Information Forensics and Security.

[18]  Blaise L. P. Gassend,et al.  Physical random functions , 2003 .

[19]  David R. Anderson,et al.  Model selection and multimodel inference : a practical information-theoretic approach , 2003 .

[20]  Ingrid Verbauwhede,et al.  PUFKY: A Fully Functional PUF-Based Cryptographic Key Generator , 2012, CHES.

[21]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[22]  H. Vincent Poor,et al.  Channel Coding Rate in the Finite Blocklength Regime , 2010, IEEE Transactions on Information Theory.

[23]  Ruye Wang,et al.  Introduction to Orthogonal Transforms: With Applications in Data Processing and Analysis , 2012 .