信息网络安全 ›› 2025, Vol. 25 ›› Issue (11): 1732-1744.doi: 10.3969/j.issn.1671-1122.2025.11.007

• 专题论文:机密计算 • 上一篇    下一篇

基于物理不可克隆函数差异化模型的联盟链硬件认证机制

沈浩頲1,2(), 彭志刚1, 刘宇轩1, 王亚飞1   

  1. 1.浙江大学计算机科学与技术学院杭州 310027
    2.杭州高新区(滨江)区块链与数据安全研究院杭州 310051
  • 收稿日期:2025-07-28 出版日期:2025-11-10 发布日期:2025-12-02
  • 通讯作者: 沈浩頲 htshen@zju.edu.cn
  • 作者简介:沈浩頲(1982—),男,浙江,研究员,博士,主要研究方向为硬件安全、智能网联车安全|彭志刚(2002—),男,江苏,硕士研究生,主要研究方向为物理不可克隆函数|刘宇轩(2001—),男,山东,博士研究生,主要研究方向为物理不可克隆函数|王亚飞(1999—),男,河南,硕士研究生,主要研究方向为区块链
  • 基金资助:
    国家重点研发计划(2022YFB2703200)

Hardware Authentication Mechanism for Consortium Blockchain Based on Differentiated Physical Unclonable Function Models

SHEN Haoting1,2(), PENG Zhigang1, LIU Yuxuan1, WANG Yafei1   

  1. 1. College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China
    2. Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Hangzhou 310051, China
  • Received:2025-07-28 Online:2025-11-10 Published:2025-12-02

摘要:

在涉及硬件数据采集的弱中心化体系中,支持多方验证的硬件级设备身份认证、可信计算和数据溯源技术是保证数据全链路安全的关键要素。物理不可克隆函数(PUF)作为一种安全性高、成本可控的硬件安全原语,被广泛应用于设备认证和数据可信领域。然而,传统PUF验证方案在多节点环境中更易泄露PUF敏感信息,进而引发验证失效的风险。因此,文章提出了一种基于PUF验证信息分发差异化和PUF模型可配置的设备验证方案,并以硬件供应链为典型应用场景,设计了相应的硬件模块、验证协议和智能合约。基于Hyperledger Fabric联盟链平台的实验结果表明,文章所提方案可以在保持系统认证效率的同时,显著提升系统对验证信息泄露的抵抗能力,并能有效防御针对PUF的机器学习建模攻击。

关键词: 联盟链, 物理不可克隆函数, 设备身份认证, 建模攻击

Abstract:

In decentralized systems involving hardware data acquisition, hardware-level device authentication, trusted computing and data traceability with multi-party verification are critical to ensuring end-to-end data security. As a secure and cost-effective hardware security primitive, physical unclonable function (PUF) has been adopted for device authentication and data verification. However, traditional PUF verification schemes are prone to leakage in multi-node environments, leading to authentication failure. To address this risk, a novel scheme that distributed differentiated and re-configurable PUF models to verification nodes for device authentication was proposed in this work. Taking hardware supply chain as the representative scenario, dedicated hardware module design, authentication protocols, and smart contract implementation were performed. Experimental results on the Hyperledger Fabric demonstrate that our approach maintaines system authentication efficiency while significantly enhancing robustness against verification data leakage. Furthermore, it effectively mitigates machine learning-based modeling attacks targeting PUF.

Key words: consortium blockchain, physical unclonable function, device authentication, modeling attack

中图分类号: