{"id":227370,"created":"2025-01-19T01:26:38.170138+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00227370","sets":["6164:6165:7651:11316"]},"path":["11316"],"owner":"44499","recid":"227370","title":["PUF Group with Dynamically Shared Entropy"],"pubdate":{"attribute_name":"公開日","attribute_value":"2023-08-23"},"_buckets":{"deposit":"f0673c69-b9a8-422f-8300-e3d831d2603e"},"_deposit":{"id":"227370","pid":{"type":"depid","value":"227370","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"PUF Group with Dynamically Shared Entropy","author_link":["605555","605552","605554","605553","605550","605551"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"PUF Group with Dynamically Shared Entropy"},{"subitem_title":"PUF Group with Dynamically Shared Entropy","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"セキュリティ","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2023-08-23","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Informatics, Kyoto University/Graduate School of Information, Production and Systems, Waseda University"},{"subitem_text_value":"Graduate School of Information, Production and Systems, Waseda University"},{"subitem_text_value":"Graduate School of Informatics, Kyoto University"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Informatics, Kyoto University / Graduate School of Information, Production and Systems, Waseda University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Information, Production and Systems, Waseda University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Informatics, Kyoto University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/227370/files/IPSJ-DAS2023005.pdf","label":"IPSJ-DAS2023005.pdf"},"date":[{"dateType":"Available","dateValue":"2025-08-23"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-DAS2023005.pdf","filesize":[{"value":"2.8 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"10"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"65e2fbaa-f0e5-44ac-9246-b1700103a70c","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2023 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Zhenzhe, Chen"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hirofumi, Shinohara"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takashi, Sato"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Zhenzhe, Chen","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hirofumi, Shinohara","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takashi, Sato","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"The traditional physical unclonable function (PUF) based authentication model is performed through a challenge-response pair (CRP) dataset, which is difficult to meet the requirements of N-party authentication. This paper introduces a new variant of the PUF group with shared entropy, which enables decentralized authentication through multiple PUFs that yield the same response. The proposed PUF group design employs a dual linear feedback shift register (LFSR) to generate inter-group unique dynamic responses. In the proposed structure, the Weak PUF entropy source provides a random initial vector of LFSRs, and the output of the LFSRs undergoes processing using a one-way nonlinear block comprising bent functions. Experimental results demonstrate desirable matching rates for the intra-group responses and high statistical performance for the inter-group responses. The proposed method achieves high levels of randomness and attack resistance with low hardware overhead, which indicates its suitability for secure and scalable N-party authentication scenarios.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The traditional physical unclonable function (PUF) based authentication model is performed through a challenge-response pair (CRP) dataset, which is difficult to meet the requirements of N-party authentication. This paper introduces a new variant of the PUF group with shared entropy, which enables decentralized authentication through multiple PUFs that yield the same response. The proposed PUF group design employs a dual linear feedback shift register (LFSR) to generate inter-group unique dynamic responses. In the proposed structure, the Weak PUF entropy source provides a random initial vector of LFSRs, and the output of the LFSRs undergoes processing using a one-way nonlinear block comprising bent functions. Experimental results demonstrate desirable matching rates for the intra-group responses and high statistical performance for the inter-group responses. The proposed method achieves high levels of randomness and attack resistance with low hardware overhead, which indicates its suitability for secure and scalable N-party authentication scenarios.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"28","bibliographic_titles":[{"bibliographic_title":"DAシンポジウム2023論文集"}],"bibliographicPageStart":"23","bibliographicIssueDates":{"bibliographicIssueDate":"2023-08-23","bibliographicIssueDateType":"Issued"},"bibliographicVolumeNumber":"2023"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"updated":"2025-01-19T12:11:43.470570+00:00","links":{}}