DocumentCode :
119871
Title :
Cryptographie key generation from PUF data using efficient fuzzy extractors
Author :
Hyunho Kang ; Hori, Yoichi ; Katashita, Toshihiro ; Hagiwara, Manabu ; Iwamura, Keiichi
Author_Institution :
Dept. of Electr. Eng., Tokyo Univ. of Sci., Tokyo, Japan
fYear :
2014
fDate :
16-19 Feb. 2014
Firstpage :
23
Lastpage :
26
Abstract :
Physical unclonable functions (PUFs) and biometrics are inherently noisy. When used in practice as cryptographic key generators, they need to be combined with an extraction technique to derive reliable bit strings (i.e., cryptographic key). An approach based on an error correcting code was proposed by Dodis et al. and is known as a fuzzy extractor. However, this method appears to be difficult for non-specialists to implement. In our recent study, we reported the results of some example implementations using PUF data and presented a detailed implementation diagram. In this paper, we describe a more efficient implementation method by replacing the hash function output with the syndrome from the BCH code. The experimental results show that the Hamming distance between two keys vary according to the key size and information-theoretic security has been achieved.
Keywords :
Hamming codes; cryptography; error correction codes; fuzzy set theory; BCH code; Hamming distance; PUF data; biometrics; cryptographic key generation; efficient fuzzy extractors; error correcting code; information-theoretic security; physical unclonable functions; reliable bit strings; Cryptography; Data mining; Entropy; Hamming distance; High definition video; Indexes; Reliability; Arbiter PUF; Fuzzy Extractor; Physical Unclonable Functions;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Communication Technology (ICACT), 2014 16th International Conference on
Conference_Location :
Pyeongchang
Print_ISBN :
978-89-968650-2-5
Type :
conf
DOI :
10.1109/ICACT.2014.6778915
Filename :
6778915
Link To Document :
بازگشت