Education, Science, Technology, Innovation and Life
Open Access
Sign In

Uniformity optimization method for arbiter physically unclonable functions

Download as PDF

DOI: 10.23977/jeis.2023.080409 | Downloads: 5 | Views: 292

Author(s)

Jiang Junhao 1

Affiliation(s)

1 Jining Confucius International School, Jining, China

Corresponding Author

Jiang Junhao

ABSTRACT

In recent years, hardware encryption based on physically unclonable functions (PUFs) has increased in significance in information security. In general, a PUF is evaluated by three indicators: reliability, uniqueness, and uniformity. In this paper, the arbitrator PUF is mainly studied, and a uniformity adjustment scheme is proposed. The main idea of this scheme is to add an adjustment module to the original circuit and construct an algorithm that automatically sets the adjustment signal according to the response. Finally, we use FPGAs to test the uniformity, reliability, and uniqueness of the adjusted PUF.K.

KEYWORDS

PUF, uniformity, optimization

CITE THIS PAPER

Jiang Junhao, Uniformity optimization method for arbiter physically unclonable functions. Journal of Electronics and Information Science (2023) Vol. 8: 52-56. DOI: http://dx.doi.org/10.23977/10.23977/jeis.2023.080409.

REFERENCES

[1] Han Lijuan, Qian Lei, Yao Enyi, et al. Design of physical unclonable functional circuit based on hierarchical transformation[J]. Computer Science and Technology Research, 2021, 7 (2):86-93. 
[2] IEEE Asian Solid-State Circuits Conference (A-SSCC), 2020, J. C. H. Chang, "Intelligent Chips and Techniques for AIoT Era" Note 1 to 4, doi: A-SSCC48613. 2020. 9336122. 
[3] Liu Hailong. Research on Key Technologies and FPGA Implementation of PUF-based Key Generation [D]. Hubei: Huazhong University of Science and Technology, 2018. 
[4] Ophey W., Skoric B., T. T. Integrated Physical Unclonable Function (Puf) with Combined Sensor and Display: US, 20080231418A1 [P]. 2008-10-22. 
[5] Zhang Junqin, Gu Dawu, Hou Fangyong. Research and application of PUF in improved arbitration procedures [J]. Computer Engineering, 2010 (3):3. 
[6] Wang Yi. The Research and Appucation of Hardware Cryptographic System [D]. Beijing: Beijing University of Posts and Telecommunications, 2006. 
[7] W. Zhenyu, D. Ding, G. Yang and L. Shaoqing, "HCRO-LKSM: A Lightweight Key Sharing and Management Protocol Based on HCRO-PUF for IoT Devices, " 2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys), Hainan, China, 2022, pp. 1366-1373, doi: 10. 1109/HPCC-DSS-SmartCity-DependSys57074. 2022. 00212.

Downloads: 6472
Visits: 252481

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.