Physically unclonable constants (PUCs) have recently been proposed for private ID generation. Because in most of the proposed PUC schemes the generated value is not stable (i.e., it can change at different turn-ons), a postprocessing with a stabilizer is usually required. Most of the proposed stabilizer schemes use auxiliary data (helper data) to overcome the inherent randomness of the generation process. However, this complicates the structure of the scheme and poses additional security problems (e.g., helper data can be vectors for attacks), so that there is some interest in stabilizers that do not use helpers (helperless stabilizers). In this paper, we begin the study of the theoretical limits of helperless stabilizers. We show three main results: 1) perfect stability is unachievable; 2) we can make as small as desired the probability that a PUC has low stability; and 3) we can reliably recognize the bad devices at production time and discard them. The proofs of the latter two results are constructive. © 2013 IEEE.

Theoretical Limits of Helper-less Stabilizers for Physically Unclonable Constants

BERNARDINI, Riccardo;RINALDO, Roberto
2016-01-01

Abstract

Physically unclonable constants (PUCs) have recently been proposed for private ID generation. Because in most of the proposed PUC schemes the generated value is not stable (i.e., it can change at different turn-ons), a postprocessing with a stabilizer is usually required. Most of the proposed stabilizer schemes use auxiliary data (helper data) to overcome the inherent randomness of the generation process. However, this complicates the structure of the scheme and poses additional security problems (e.g., helper data can be vectors for attacks), so that there is some interest in stabilizers that do not use helpers (helperless stabilizers). In this paper, we begin the study of the theoretical limits of helperless stabilizers. We show three main results: 1) perfect stability is unachievable; 2) we can make as small as desired the probability that a PUC has low stability; and 3) we can reliably recognize the bad devices at production time and discard them. The proofs of the latter two results are constructive. © 2013 IEEE.
File in questo prodotto:
File Dimensione Formato  
2014-IEEE-Tran-computer-theoretical-limtis-helperless.pdf

non disponibili

Tipologia: Versione Editoriale (PDF)
Licenza: Non pubblico
Dimensione 3.79 MB
Formato Adobe PDF
3.79 MB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11390/1071350
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 5
  • ???jsp.display-item.citation.isi??? 3
social impact