Skip to main content

Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10348))

Abstract

This paper proposes a new debiasing method for a stable and efficient extraction of uniform random binary responses from physically unclonable functions (PUFs). The proposed method handles multiple-valued (i.e., ternary) responses from PUF responses, including unstable response bits, and stably extracts uniform random-bit responses from them. In this paper, we evaluate the stability and effectiveness of the proposed method with two experiments with simulated and actual responses of latch PUFs implemented on an FPGA. We demonstrate that the proposed method can obtain longer debiased random-bit responses than the conventional method. In addition, we apply the proposed method to the construction of a fuzzy extractor (FE), and show the advantages of the proposed FE in terms of response length and authentication success rate in an experimental evaluation.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Note that the information about these locations is secret information.

  2. 2.

    Y and \(Y'\) do not have a precisely n/2-bit length. However, when \(x_{2i} = x_{2i+1}\) (or \(x'_{2i} = x'_{2i+1}\)), the output \(y_{i}\) (or \(y'_{i}\)) is considered to have a “discard” value in order to simplify the formulation.

References

  1. Dodis, Y., Reyzin, M., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  2. Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63–80. Springer, Heidelberg (2007). doi:10.1007/978-3-540-74735-2_5

    Chapter  Google Scholar 

  3. Koeberl, P., Li, J., Rajan, A., Wu, W.: Entropy loss in puf-based key generation schemes : the repetition code pitfall, pp. 44–49 (2014)

    Google Scholar 

  4. Lily, C.: Recommendation for key derivation using pseudorandom functions(revised) (2009)

    Google Scholar 

  5. Lily, C.: Recommendation for key derivation through extraction-then-expansion (2011)

    Google Scholar 

  6. Lim, D., Lee, J., Gassend, B., Suh, G., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Trans. Very Large Scale Integer VLSI Syst. 13(10), 1200–1205 (2005)

    Article  Google Scholar 

  7. Maes, R.: Physically Unclonable Functions. Springer, Heidelberg (2013)

    Book  MATH  Google Scholar 

  8. Maes, R., Leest, V., Sluis, E., Willems, F.: Secure key generation from biased PUFs. In: Güneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 517–534. Springer, Heidelberg (2015). doi:10.1007/978-3-662-48324-4_26

    Chapter  Google Scholar 

  9. von Neumann, J.: Various techniques used in connection with random digits. Appl. Math. Ser. 12, 36–38 (1951). National Bureau of Standards, USA

    Google Scholar 

  10. Su, Y., Holleman, J., Otis, B.: A 1.6pj/bit 96% stable chip-id generating circuit using process variations. In: IEEE International Solid-State Circuits Conference (ISSCC2007), pp. 406–611 (2007)

    Google Scholar 

  11. Su, Y., Holleman, J., Otis, B.: A digital 1.6pj/bit chip identification circuit using process variations. IEEE J. Solid-State Circ. 43(1), 69–77 (2008)

    Article  Google Scholar 

  12. Yamamoto, D., Sakiyama, K., Iwamoto, M., Ohta, K., Takenaka, M., Itoh, K.: Variety enhancement of PUF responce using the locations of random outputting RS latches. Crypt. Eng. 3(4), 197–211 (2013)

    Article  MATH  Google Scholar 

Download references

Acknowledgment

This work has been supported by JSPS KAKENHI Grants No. 16K12436 and No. 16J05711.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manami Suzuki .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Suzuki, M., Ueno, R., Homma, N., Aoki, T. (2017). Multiple-Valued Debiasing for Physically Unclonable Functions and Its Application to Fuzzy Extractors. In: Guilley, S. (eds) Constructive Side-Channel Analysis and Secure Design. COSADE 2017. Lecture Notes in Computer Science(), vol 10348. Springer, Cham. https://doi.org/10.1007/978-3-319-64647-3_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-64647-3_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-64646-6

  • Online ISBN: 978-3-319-64647-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics