Security analysis of Quantum-Readout PUFs in the case of challenge-estimation attacks

Quantum Readout (QR) of Physical Unclonable Functions (PUFs) is a new technique for remotely authenticating objects, which has recently been demonstrated experimentally. The security is based on basic quantum information theoretic principles and holds under the assumption that the adversary cannot clone or physically emulate PUFs. We analyse the security of QR under a class of attacks called `digital emulation', in which the adversary first performs state estimation on the challenge and then bases his response on this estimate. We make use of a result by Bru\ss{} and Macchiavello to derive an upper bound on the adversary's success probability as a function of the Hilbert space dimension $K$ and the photon number~$n$. We prove that QR is unconditionally secure against digital emulation attacks when the challenges are Fock states. For non-Fock-states we provide a security proof under the condition that the attacker's measurements commute with the particle number operator.

[1]  Moti Yung,et al.  Towards Hardware-Intrinsic Security , 2010 .

[2]  Boris Skoric,et al.  Information-Theoretic Security Analysis of Physical Uncloneable Functions , 2005, Financial Cryptography.

[3]  Boris Skoric,et al.  Read-Proof Hardware from Protective Coatings , 2006, CHES.

[4]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[5]  Stephen A. Benton,et al.  Physical one-way functions , 2001 .

[6]  Boris Skoric,et al.  Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks , 2013, IACR Cryptol. ePrint Arch..

[7]  S. A. Goorden,et al.  Quantum-Secure Authentication with a Classical Key , 2013, 1303.0142.

[8]  Boris Skoric On the entropy of keys derived from laser speckle; statistical properties of Gabor-transformed speckle , 2008 .

[9]  Jorge Guajardo,et al.  FPGA Intrinsic PUFs and Their Use for IP Protection , 2007, CHES.

[10]  Boris Skoric,et al.  Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting , 2007 .

[11]  C. Macchiavello,et al.  Optimal state estimation for d-dimensional quantum systems☆ , 1998, quant-ph/9812016.

[12]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[13]  D. Dieks Communication by EPR devices , 1982 .

[14]  Boris Skoric,et al.  Randomized resonators as uniquely identifiable anti-counterfeiting tags , 2008 .

[15]  Boris Skoric,et al.  Quantum-secure authentication of a physical unclonable key , 2014, CLEO 2015.

[16]  Boris Skoric,et al.  Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method , 2006, 2006 IEEE International Symposium on Information Theory.

[17]  Gang Xiong,et al.  Forgery: ‘Fingerprinting’ documents and packaging , 2005, Nature.

[18]  R. Pappu,et al.  Physical One-Way Functions , 2002, Science.

[19]  Boris Skoric,et al.  Quantum Readout of Physical Unclonable Functions , 2010, AFRICACRYPT.