A Provably Secure Strong PUF based on LWE: Construction and
Implementation
- URL: http://arxiv.org/abs/2303.02802v1
- Date: Sun, 5 Mar 2023 23:41:00 GMT
- Title: A Provably Secure Strong PUF based on LWE: Construction and
Implementation
- Authors: Xiaodan Xi, Ge Li, Ye Wang, Yeonsoo Jeon and Michael Orshansky
- Abstract summary: We construct a lattice PUF with provable security against ML attacks on classical and quantum computers.
We prototype lattice PUF designs with $2136$ challenge-response pairs (CRPs) on a Spartan 6 FPGA.
The resource-efficient design requires only $45$ slices for the PUF logic proper, and $351$ slices for a fuzzy extractor.
- Score: 11.66624679713865
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: We construct a strong PUF with provable security against ML attacks on both
classical and quantum computers. The security is guaranteed by the
cryptographic hardness of learning decryption functions of public-key
cryptosystems, and the hardness of the learning-with-errors (LWE) problem
defined on integer lattices. We call our construction the lattice PUF.
We construct lattice PUF with a physically obfuscated key and an LWE
decryption function block. To allow deployments in different scenarios, we
demonstrate designs with different latency-area trade-offs. A compact design
uses a highly serialized LFSR and LWE decryption function, while a
latency-optimized design uses an unrolled LFSR and a parallel datapath.
We prototype lattice PUF designs with $2^{136}$ challenge-response pairs
(CRPs) on a Spartan 6 FPGA. In addition to theoretical security guarantee, we
evaluate empirical resistance to the various leading ML techniques: the
prediction error remains above $49.76\%$ after $1$ million training CRPs. The
resource-efficient design requires only $45$ slices for the PUF logic proper,
and $351$ slices for a fuzzy extractor. The latency-optimized design achieves a
$148X$ reduction in latency, at a $10X$ increase in PUF hardware utilization.
The mean uniformity of PUF responses is $49.98\%$, the mean uniqueness is
$50.00\%$, and the mean reliability is $1.26\%$.
Related papers
- PIO-FVLM: Rethinking Training-Free Visual Token Reduction for VLM Acceleration from an Inference-Objective Perspective [59.24570811503256]
We propose PIO-FVLM to reduce redundant visual tokens in vision-models (VLMs) to accelerate inference.<n>The proposed PIO-FVLM is training-free and compatible with FlashAttention, friendly to practical application and deployment.<n>On LLaVA-Next-7B, PIO-FVLM retains just 11.1% of visual tokens but maintains 97.2% of the original performance.
arXiv Detail & Related papers (2026-02-04T15:33:10Z) - FIPS 204-Compatible Threshold ML-DSA via Masked Lagrange Reconstruction [0.0]
Masked Lagrange reconstruction enables threshold ML-DSA with arbitrary thresholds $T$.<n>We produce standard 3.3 KB signatures verifiable by unmodified 204 implementations.
arXiv Detail & Related papers (2026-01-28T18:13:47Z) - Feature-Space Adversarial Robustness Certification for Multimodal Large Language Models [59.6491828112519]
Multimodal large language models (MLLMs) exhibit strong capabilities across diverse applications.<n> MLLMs are vulnerable to adversarial perturbations that distort their feature representations and induce erroneous predictions.<n>We propose Feature-space Smoothing (FS), a general framework that provides certified robustness guarantees at the feature representation level of MLLMs.
arXiv Detail & Related papers (2026-01-22T18:52:21Z) - Extended c-differential distinguishers of full 9 and reduced-round Kuznyechik cipher [3.3311266423308252]
This paper introduces em truncated inner $c$-differential cryptanalysis, a novel technique that for the first time enables the practical application of $c$-differential uniformity to block ciphers.<n>Our main contribution is a comprehensive multi-faceted statistical-computational framework, implementing truncated $c$-differential analysis against the full 9-round Kuznyechik cipher.
arXiv Detail & Related papers (2025-07-02T22:27:33Z) - MaskPro: Linear-Space Probabilistic Learning for Strict (N:M)-Sparsity on Large Language Models [53.36415620647177]
Semi-structured sparsity offers a promising solution by strategically retaining $N$ elements out of every $M$ weights.<n>Existing (N:M)-compatible approaches typically fall into two categories: rule-based layerwise greedy search, which suffers from considerable errors, and gradient-driven learning, which incurs prohibitive training costs.<n>We propose a novel linear-space probabilistic framework named MaskPro, which aims to learn a prior categorical distribution for every $M$ consecutive weights and subsequently leverages this distribution to generate the (N:M)-sparsity throughout an $N$-way sampling
arXiv Detail & Related papers (2025-06-15T15:02:59Z) - DAPO: An Open-Source LLM Reinforcement Learning System at Scale [63.24798333145823]
We open-source a state-of-the-art large-scale RL system that achieves 50 points on AIME 2024 using Qwen2.5-32B base model.
In addition, we open-source our training code, which is built on the verl framework, along with a carefully curated and processed dataset.
arXiv Detail & Related papers (2025-03-18T17:49:06Z) - Information Theoretic Analysis of PUF-Based Tamper Protection [2.447795279790662]
We take a step back from the implementation to analyze theoretical properties and limits.
We apply zero leakage output quantization to existing quantization schemes and the reconstruction error probability under zero leakage.
Our results show for example that for a practical scenario one needs at least 459 PUF cells using 3 bit quantization to achieve a security level of 128 bit.
arXiv Detail & Related papers (2025-02-05T14:39:41Z) - Uncertainty-Aware Reward-Free Exploration with General Function Approximation [69.27868448449755]
In this paper, we propose a reward-free reinforcement learning algorithm called alg.
The key idea behind our algorithm is an uncertainty-aware intrinsic reward for exploring the environment.
Experiment results show that GFA-RFE outperforms or is comparable to the performance of state-of-the-art unsupervised RL algorithms.
arXiv Detail & Related papers (2024-06-24T01:37:18Z) - Bit-flipping Decoder Failure Rate Estimation for (v,w)-regular Codes [84.0257274213152]
We propose a new technique to provide accurate estimates of the DFR of a two-iterations (parallel) bit flipping decoder.
We validate our results, providing comparisons of the modeled and simulated weight of the syndrome, incorrectly-guessed error bit distribution at the end of the first iteration, and two-itcrypteration Decoding Failure Rates (DFR)
arXiv Detail & Related papers (2024-01-30T11:40:24Z) - Quantum Secure Protocols for Multiparty Computations [2.9561405287476177]
We present secure multiparty computation (MPC) protocols that can withstand quantum attacks.
We first present the design and analysis of an information-theoretic secure oblivious linear evaluation (OLE), namely $sf qOLE$ in the quantum domain.
We further utilize $sf qOLE$ as a building block to construct a quantum-safe multiparty private set intersection (MPSI) protocol.
arXiv Detail & Related papers (2023-12-26T19:53:29Z) - Private and Secure Post-Quantum Verifiable Random Function with NIZK Proof and Ring-LWE Encryption in Blockchain [1.4792750204228]
We present a blockchain-based Verifiable Random Function (VRF) scheme addressing some limitations of classical VRF constructions.
To enhance our VRF's secure randomness, we adopt post-quantum Ring-LWE encryption for pseudo-random sequences.
Our results exhibit a 98.86% pass rate over 11 test cases, with an average p-value of 0.5459 from 176 total tests.
arXiv Detail & Related papers (2023-11-20T12:56:50Z) - Signatures From Pseudorandom States via $\bot$-PRFs [0.11650821883155184]
We introduce new definitions for $bot$-PRG and $bot$-PRF.
Our main application is a (quantum) digital signature scheme with classical public keys and signatures.
arXiv Detail & Related papers (2023-11-01T20:54:50Z) - Publicly-Verifiable Deletion via Target-Collapsing Functions [81.13800728941818]
We show that targetcollapsing enables publiclyverifiable deletion (PVD)
We build on this framework to obtain a variety of primitives supporting publiclyverifiable deletion from weak cryptographic assumptions.
arXiv Detail & Related papers (2023-03-15T15:00:20Z) - Quantum Lock: A Provable Quantum Communication Advantage [2.9562795446317964]
This paper proposes a generic design of provably secure PUFs, called hybrid locked PUFs(HLPUFs)
An HLPUF uses a classical PUF, and encodes the output into non-orthogonal quantum states to hide the outcomes of the underlying CPUF from any adversary.
We show that by exploiting non-classical properties of quantum states, the HLPUF allows the server to reuse the challenge-response pairs for further client authentication.
arXiv Detail & Related papers (2021-10-18T17:01:46Z) - ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep
Neural Network and Transfer Learning [80.85273827468063]
Existing machine learning-based vulnerability detection methods are limited and only inspect whether the smart contract is vulnerable.
We propose ESCORT, the first Deep Neural Network (DNN)-based vulnerability detection framework for smart contracts.
We show that ESCORT achieves an average F1-score of 95% on six vulnerability types and the detection time is 0.02 seconds per contract.
arXiv Detail & Related papers (2021-03-23T15:04:44Z) - Blockchain Assisted Decentralized Federated Learning (BLADE-FL) with
Lazy Clients [124.48732110742623]
We propose a novel framework by integrating blockchain into Federated Learning (FL)
BLADE-FL has a good performance in terms of privacy preservation, tamper resistance, and effective cooperation of learning.
It gives rise to a new problem of training deficiency, caused by lazy clients who plagiarize others' trained models and add artificial noises to conceal their cheating behaviors.
arXiv Detail & Related papers (2020-12-02T12:18:27Z) - Quantum copy-protection of compute-and-compare programs in the quantum random oracle model [48.94443749859216]
We introduce a quantum copy-protection scheme for a class of evasive functions known as " compute-and-compare programs"
We prove that our scheme achieves non-trivial security against fully malicious adversaries in the quantum random oracle model (QROM)
As a complementary result, we show that the same scheme fulfils a weaker notion of software protection, called "secure software leasing"
arXiv Detail & Related papers (2020-09-29T08:41:53Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.