JOURNAL ARTICLE

PUF Authentication using Visual Secret Sharing Scheme

Abstract

There are so many modern cryptographic protocols are available which can be used for authenticating wirelessly connected devices. Usually the keys are stored inside the memory of the integrated device which will prompt adversaries to extract secret keys from integrated device. We can persist these attacks by using Physically unclonable functions (PUFs). PUF protocol are designed in such a way that it needs to be light-weight and is resistance against physical attacks. In this paper, we are utilizing the secret sharing method with PUF for an efficient and secure method to authenticate the devices. This new approach is lightweight and suitable for energy constrained platforms such as IOT, smart cards. The proposed protocol does not follow the classic PUF protocol challenge and response pairs, instead of that here a set of shares generated using (2, n) ideal visual secret sharing method are used for authentication.

Keywords:
Computer science Secret sharing Authentication protocol Authentication (law) Protocol (science) Physical unclonable function Cryptography Cryptographic protocol Scheme (mathematics) Secure multi-party computation Homomorphic secret sharing Computer network Verifiable secret sharing Computer security Shared secret Message authentication code Set (abstract data type) Embedded system

Metrics

5
Cited By
1.04
FWCI (Field Weighted Citation Impact)
15
Refs
0.73
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Physical Unclonable Functions (PUFs) and Hardware Security
Physical Sciences →  Computer Science →  Hardware and Architecture
Neuroscience and Neural Engineering
Life Sciences →  Neuroscience →  Cellular and Molecular Neuroscience
Advanced Memory and Neural Computing
Physical Sciences →  Engineering →  Electrical and Electronic Engineering

Related Documents

JOURNAL ARTICLE

On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

Daoshun WangFeng Yi

Journal:   EURASIP Journal on Advances in Signal Processing Year: 2010 Vol: 2010 (1)
BOOK-CHAPTER

Hierarchical Visual Secret Sharing Scheme Using Steganography

Biswapati JanaAmita SamantaDebasis Giri

Springer proceedings in mathematics & statistics Year: 2015 Pages: 363-389
JOURNAL ARTICLE

Secret Sharing Scheme with Fingerprint Authentication

A.P. SarangarajaD. RajagopalanA. VigneshP. Mohamed Fathimal

Journal:   Advances in science and technology Year: 2023 Vol: 124 Pages: 719-728
JOURNAL ARTICLE

Efficient group authentication in RFID using secret sharing scheme

Yanxiao LiuQindong SunYichuan WangLei ZhuWenjiang Ji

Journal:   Cluster Computing Year: 2018 Vol: 22 (S4)Pages: 8605-8611
© 2026 ScienceGate Book Chapters — All rights reserved.