Debiasing Method for Efficient Ternary Fuzzy Extractors and Ternary Physically Unclonable Functions

Kohei Kazumori, Rei Ueno, Naofumi Homma

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

In this paper, we propose a debiasing method for efficiently extracting unbiased ternary strings from biased ternary physically unclonable functions (PUFs). The conventional debiasing method applicable to ternary PUFs extracts unbiased strings from ternary PUFs by discarding the response of certain cells according to the ternary-extended von Neumann corrector (VNC). The proposed method probabilistically extracts the information, which is discarded in the conventional method, as the third value based on a rejection sampling. To demonstrate the effectiveness and efficiency of the proposed method, we evaluate the PUF sizes required for reliable 128-bit cryptographic key generation from PUFs with varying biases and error rates. The results show that the proposed method can reduce the PUF size by 63%, compared with the conventional method.

Original languageEnglish
Title of host publicationProceedings - 2020 IEEE 50th International Symposium on Multiple-Valued Logic, ISMVL 2020
PublisherIEEE Computer Society
Pages52-57
Number of pages6
ISBN (Electronic)9781728154060
DOIs
Publication statusPublished - 2020 Nov
Event50th IEEE International Symposium on Multiple-Valued Logic, ISMVL 2020 - Miyazaki, Japan
Duration: 2020 Nov 92020 Nov 11

Publication series

NameProceedings of The International Symposium on Multiple-Valued Logic
Volume2020-November
ISSN (Print)0195-623X

Conference

Conference50th IEEE International Symposium on Multiple-Valued Logic, ISMVL 2020
Country/TerritoryJapan
CityMiyazaki
Period20/11/920/11/11

Keywords

  • Cryptographic key generation
  • Debiasing
  • Fuzzy extractor
  • Physically unclonable function (PUF)

Fingerprint

Dive into the research topics of 'Debiasing Method for Efficient Ternary Fuzzy Extractors and Ternary Physically Unclonable Functions'. Together they form a unique fingerprint.

Cite this