Secret Sharing Schemes Based Secure Authentication for Physical Unclonable Function

Physical unclonable functions (PUFs) have attracted attention as authentication techniques for electronic devices. However, the risk of machine learning attacks for PUFs is pointed out. This study proposes a new secure PUF authentication method using secret sharing schemes. The proposed method uses the generated distributed values for the authentication instead of PUF responses. The proposed method improves the resistance against attacks by not communicating raw PUF responses directly. Simulation results showed that the proposed method could improve the resistance against machine learning attacks compared with the conventional simple challenge and response authentication method. Moreover, the area comparison using a Xilinx field programming gate array indicated the proposed method reduced its area by 0.6 times compared with a resistant-PUF.

[1]  Magdy A. Bayoumi,et al.  A PUF-based paradigm for IoT security , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).

[2]  G. Edward Suh,et al.  Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.

[3]  Mitsugu Iwamoto,et al.  A new mode of operation for arbiter PUF to improve uniqueness on FPGA , 2014, 2014 Federated Conference on Computer Science and Information Systems.

[4]  Marten van Dijk,et al.  A technique to build a secret key in integrated circuits for identification and authentication applications , 2004, 2004 Symposium on VLSI Circuits. Digest of Technical Papers (IEEE Cat. No.04CH37525).

[5]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[6]  Srinivas Devadas,et al.  PUF Modeling Attacks on Simulated and Silicon Data , 2013, IEEE Transactions on Information Forensics and Security.

[7]  Miodrag Potkonjak,et al.  Lightweight secure PUFs , 2008, ICCAD 2008.

[8]  Biplab Sikdar,et al.  Mutual Authentication in IoT Systems Using Physical Unclonable Functions , 2017, IEEE Internet of Things Journal.

[9]  Sasan Khoshroo Design and Evaluation of FPGA-based Hybrid Physically Unclonable Functions , 2013 .

[10]  An Braeken,et al.  PUF Based Authentication Protocol for IoT , 2018, Symmetry.

[11]  G. Edward Suh,et al.  Extracting secret keys from integrated circuits , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[12]  Toshiaki Tanaka,et al.  On a Fast (k, n)-Threshold Secret Sharing Scheme , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..