{"created":"2023-05-15T08:43:48.459694+00:00","id":8896,"links":{},"metadata":{"_buckets":{"deposit":"357fdc19-1e89-45e8-8cbd-9475fee7280a"},"_deposit":{"created_by":13,"id":"8896","owners":[13],"pid":{"revision_id":0,"type":"depid","value":"8896"},"status":"published"},"_oai":{"id":"oai:uec.repo.nii.ac.jp:00008896","sets":["6"]},"author_link":["24222","24219","24221","24220"],"item_10001_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2018-01-01","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"1","bibliographicPageEnd":"137","bibliographicPageStart":"129","bibliographicVolumeNumber":"E101.A","bibliographic_titles":[{},{"bibliographic_title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences","bibliographic_titleLang":"en"}]}]},"item_10001_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Physically Unclonable Function (PUF) is a cryptographic primitive that is based on physical property of each entity or Integrated Circuit (IC) chip. It is expected that PUF be used in security applications such as ID generation and authentication. Some responses from PUF are unreliable, and they are usually discarded. In this paper, we propose a new PUF-based authentication system that exploits information of unreliable responses. In the proposed method, each response is categorized into multiple classes by its unreliability evaluated by feeding the same challenges several times. This authentication system is named Q-class authentication, where Q is the number of classes. We perform experiments assuming a challenge-response authentication system with a certain threshold of errors. Considering 4-class separation for 4-1 Double Arbiter PUF, it is figured out that the advantage of a legitimate prover against a clone is improved form 24% to 36% in terms of success rate. In other words, it is possible to improve the tolerance of machine-learning attack by using unreliable information that was previously regarded disadvantageous to authentication systems.","subitem_description_type":"Abstract"}]},"item_10001_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"IEICE"}]},"item_10001_relation_14":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type":"isIdenticalTo","subitem_relation_type_id":{"subitem_relation_type_id_text":"10.1587/transfun.E101.A.129","subitem_relation_type_select":"DOI"}}]},"item_10001_relation_17":{"attribute_name":"関連サイト","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_id_text":"http://search.ieice.org/index.html","subitem_relation_type_select":"URI"}}]},"item_10001_rights_15":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"copyright©2018 IEICE"}]},"item_10001_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"0916-8508","subitem_source_identifier_type":"ISSN"}]},"item_10001_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"YASHIRO, Risa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"SUGAWARA, Takeshi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"IWAMOTO, Mitsugu","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"SAKIYAMA, Kazuo","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2019-01-17"}],"displaytype":"detail","filename":"e101-a_1_129.pdf","filesize":[{"value":"2.9 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"e101-a_1_129","url":"https://uec.repo.nii.ac.jp/record/8896/files/e101-a_1_129.pdf"},"version_id":"0e7b4f32-b3be-469e-ad61-52ab2e772864"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Physically Unclonable Function","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"authentication","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"machine-learning attack","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"Q-Class Authentication System for Double Arbiter PUF","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Q-Class Authentication System for Double Arbiter PUF","subitem_title_language":"en"}]},"item_type_id":"10001","owner":"13","path":["6"],"pubdate":{"attribute_name":"公開日","attribute_value":"2019-01-17"},"publish_date":"2019-01-17","publish_status":"0","recid":"8896","relation_version_is_last":true,"title":["Q-Class Authentication System for Double Arbiter PUF"],"weko_creator_id":"13","weko_shared_id":-1},"updated":"2023-05-15T10:07:41.320283+00:00"}