2023
DOI: 10.3390/s23073476
|View full text |Cite
|
Sign up to set email alerts
|

A PUF-Based Key Storage Scheme Using Fuzzy Vault

Abstract: Physical Unclonable Functions (PUFs) are considered attractive low-cost security anchors in the key generation scheme. The helper data algorithm is usually used to transform the fuzzy responses extracted from PUF into a reproducible key. The generated key can be used to encrypt secret data in traditional security schemes. In contrast, this work shows that the fuzzy responses of both weak and strong PUFs can be used to secretly store the important data (e.g., the distributed keys) directly by an error-tolerant … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 48 publications
0
2
0
Order By: Relevance
“…Such running time between encoding and decoding shows little difference compared to the existing fuzzy vault execution time according to the increase in chaff points. Table 1 compares the performance with the latest research including execution time by Yang, J. et al [38]. Yang's execution time for both encoding and decoding, like the results of other fuzzy vault schemes, increases according to the increase in the polynomial degree and the number of chaff points.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Such running time between encoding and decoding shows little difference compared to the existing fuzzy vault execution time according to the increase in chaff points. Table 1 compares the performance with the latest research including execution time by Yang, J. et al [38]. Yang's execution time for both encoding and decoding, like the results of other fuzzy vault schemes, increases according to the increase in the polynomial degree and the number of chaff points.…”
Section: Resultsmentioning
confidence: 99%
“…Many modified fuzzy vault schemes that use various biometric features (e.g., face, iris, or signature) have since been proposed based on this preliminary version and have tried various strategies to improve their performance [5,[33][34][35][36][37]. More recently, there have been attempts at applying a biometric cryptography scheme to physical unclonable function (PUF) [38], Body Area Networks (BAN) [2,[39][40][41][42][43], Electrocardiogram (ECG) [44], or wireless networks for symmetric key distribution through the transformation of fuzzy vault schemes.…”
Section: Introductionmentioning
confidence: 99%