Paper 2015/937

End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol

Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont, and Moti Yung


We demonstrate a prototype implementation of a provably secure protocol that supports privacy-preserving mutual authentication between a server and a constrained device. Our proposed protocol is based on a physically unclonable function (PUF) and it is optimized for resource-constrained platforms. The reported results include a full protocol analysis, the design of its building blocks, their integration into a constrained device, and finally its performance evaluation. We show how to obtain efficient implementations for each of the building blocks of the protocol, including a fuzzy extractor with a novel helper-data construction technique, a truly random number generator (TRNG), and a pseudo-random function (PRF). The prototype is implemented on a SASEBO-GII board, using the on-board SRAM as the source of entropy for the PUF and the TRNG. We present three different implementations. The first two execute on a MSP430 soft-core processor and have a security level of 64-bit and 128-bit respectively. The third uses a hardware accelerator and has 128-bit security level. To our best knowledge, this work is the first effort to describe the end-to-end design and evaluation of a privacy-preserving PUF-based authentication protocol.

Note: A preliminary version of this paper appears in the proceedings of CHES 2015. This is the full version including the security proof against the proposed protocol.

Available format(s)
Publication info
A minor revision of an IACR publication in CHES 2015
Physically Unclonable Functionauthenticationprivacy-preserving protocolimplementation
Contact author(s)
dmoriyam @ nict go jp
2015-11-11: revised
2015-09-28: received
See all versions
Short URL
Creative Commons Attribution


      author = {Aydin Aysu and Ege Gulcan and Daisuke Moriyama and Patrick Schaumont and Moti Yung},
      title = {End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol},
      howpublished = {Cryptology ePrint Archive, Paper 2015/937},
      year = {2015},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.