Skip to main navigation Skip to search Skip to main content

Optimal capacity region for PUF-based authentication with a constraint on the number of challenge-response pairs

  • Technical University of Munich

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this work we consider the problem of a PUF-based authentication model with a generated secret key. The considered scenario is that after an enrollment phase, where for several challenge-response pairs a secret key and helper data is generated, the decoder will choose one of the challenges uniform at random for authentication, this time the PUF provides a noisy version of the original response; we use the helper data to reconstruct the formerly calculated secret key. We will give an optimal capacity region for the model with respect to the number of generated challenge-response pairs, and the rate of communicated helper data, the amount of privacy leakage, the size of the secret key, and the distribution of the secret key, for each challenge index. For each challenge index we also minimize the probability of falsely rejecting a legitimate party, and the knowledge an adversary can gain about the secret key. This work provides further insights into the work in [1], using a similar model but different security criteria while additionally providing an optimal upper bound on the total number of challenge-response pairs that can be maintained by this model.

Original languageEnglish
Title of host publication2017 IEEE Conference on Communications and Network Security, CNS 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages575-579
Number of pages5
ISBN (Electronic)9781538606834
DOIs
StatePublished - 19 Dec 2017
Event2017 IEEE Conference on Communications and Network Security, CNS 2017 - Las Vegas, United States
Duration: 9 Oct 201711 Oct 2017

Publication series

Name2017 IEEE Conference on Communications and Network Security, CNS 2017
Volume2017-January

Conference

Conference2017 IEEE Conference on Communications and Network Security, CNS 2017
Country/TerritoryUnited States
CityLas Vegas
Period9/10/1711/10/17

Fingerprint

Dive into the research topics of 'Optimal capacity region for PUF-based authentication with a constraint on the number of challenge-response pairs'. Together they form a unique fingerprint.

Cite this