Presentation 2010/11/23
Performance Evaluation for PUF-based Authentication Systems with Shift Post-processing
Hyunho KANG, Yohei HORI, Toshihiro KATASHITA, Akashi SATOH,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) A physical unclonable function (PUF) is a physical system with a device manufacturing variations and could be useful for authentication of integrated circuits. However, it is claimed that the amount of randomness in the PUF output is limited. Therefore, the response of the PUF cannot be used directly as a key. In this paper we discuss a making method of the PUF output with much more randomness while maintaining the reliability. In order to do this, a simple shift post-processing will apply to the PUF output. The experimental results show that the authentication system using shifted response data have improved performance compared to non-shifted data.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) physical unclonable function(PUF) / authentication / shift post-processing
Paper # RECONF-2010-49
Date of Issue

Conference Information
Committee RECONF
Conference Date 2010/11/23(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Reconfigurable Systems (RECONF)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Performance Evaluation for PUF-based Authentication Systems with Shift Post-processing
Sub Title (in English)
Keyword(1) physical unclonable function(PUF)
Keyword(2) authentication
Keyword(3) shift post-processing
1st Author's Name Hyunho KANG
1st Author's Affiliation Research Center for Information Security(RCIS):Advanced Industrial Science and Technology(AIST)()
2nd Author's Name Yohei HORI
2nd Author's Affiliation Research Center for Information Security(RCIS):Advanced Industrial Science and Technology(AIST)
3rd Author's Name Toshihiro KATASHITA
3rd Author's Affiliation Research Center for Information Security(RCIS):Advanced Industrial Science and Technology(AIST)
4th Author's Name Akashi SATOH
4th Author's Affiliation Research Center for Information Security(RCIS):Advanced Industrial Science and Technology(AIST)
Date 2010/11/23
Paper # RECONF-2010-49
Volume (vol) vol.110
Number (no) 319
Page pp.pp.-
#Pages 4
Date of Issue