Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

APUF security authentication method based on polynomial reconstruction

A technology of polynomial reconstruction and security authentication, which is applied to secure communication devices and key distribution, can solve the problems of unsatisfactory PUF reliable implementation, PUF reliability decline, resource consumption increase, etc., to achieve resistance to machine learning attacks and high reliability And safety, the effect of improving safety

Active Publication Date: 2018-02-23
SOUTHEAST UNIV
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are certain problems in these structures. With the complexity of the structure, the reliability of PUF decreases, and the resource consumption increases, which cannot satisfy the reliable realization of PUF in some resource-limited situations.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • APUF security authentication method based on polynomial reconstruction
  • APUF security authentication method based on polynomial reconstruction
  • APUF security authentication method based on polynomial reconstruction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Embodiments of the invention are described in detail below, examples of which are illustrated in the accompanying drawings. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0040] Such as figure 1As shown, an APUF security authentication method based on polynomial reconstruction is realized by the APUF security authentication system, and the whole system generally includes APUF modules and polynomial building blocks. The server randomly generates a large number of incentives, and at the same time generates a random number. Stimuli are used in the APUF module to generate the corresponding stimuli used as abscissas. Random numbers are used for polynomial coefficients after CRC-16 checking. Using the excitation as the abscissa, find all the real points in the polynomial, and add a large number of hash points to form a point set. Store the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an APUF security authentication method based on polynomial reconstruction. The method comprises two stages of registration and authentication. At the registration stage, a server randomly generates a large number of incentives and a random number k, and an APUF generates corresponding response to serve as an abscissa. After CRC encoding, a corresponding real point is foundfrom a polynomial using the k as the coefficient, and a large number of hash points are added to form a point set V. The incentives, the point set V and a polynomial coefficient hash (k) subjected tothe hash are stored in the server. At the authentication stage, a PUF circuit on the hand of a user generates response, randomizes the response, and queries the corresponding real point in the point set V for constructing a polynomial so as to obtain a polynomial coefficient (the formula is described in the specification). Contrast authentication is performed on the (the formula is described in the specification) and the hash (k), and the authentication is successful if the two coefficients are the same. According to the APUF security authentication method disclosed by the invention, by meansof the response to the randomization processing by the APUF and the adding of the hash points, the machine learning attack can be resisted to ensure the security and the reliability of the data.

Description

technical field [0001] The invention relates to an APUF security authentication method based on polynomial reconstruction, in particular to an APUF security authentication technology against machine learning attacks, and belongs to the technical field of information security. Background technique [0002] In recent years, with the rapid development of the Internet of Things and radio frequency identification technology, the collaborative relationship between things and things, people and things, and people has been established, thus forming a more comprehensive network based on sensor networks, the Internet and mobile communication networks. Large and complex network systems. Most electronic devices interact with a network or are controlled by a computer. The Internet of Things generates a large amount of information and data, involving perception, storage, computing, transmission and other links, and its security is directly related to the development of the Internet of Th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0866H04L9/3278
Inventor 李冰淡富奎陈剑陈帅沈克强董乾张林王刚赵霞刘勇
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products