2019
DOI: 10.1155/2019/5935292
|View full text |Cite
|
Sign up to set email alerts
|

A Generic Multifactor Authenticated Key Exchange with Physical Unclonable Function

Abstract: We study how to generally construct a PUF-based multifactor authenticated key exchange (MAKE) protocol from any secure password-based authenticated key exchange protocol. We newly consider a new setting in which a user holding a PUF-embedded device desires to perform an authenticate key exchange through multifactor authentication factors (password, biometrics, secret). Our construction is the first PUF-based general MAKE construction. By applying a PUF in a device, our MAKE construction is still secure even if… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 41 publications
0
8
0
Order By: Relevance
“…Over the last decade, extensive research has been conducted in areas of PUF-based authentication or AKE under various settings (e.g., IoT, RFID, smart meter system, and smart grid) [1], [5], [6], [8], [11], [12], [17], [18], [24], [25], [27], [29]- [32], [37], [39], [44], [45]. A PUF has been applied in an RFID authentication for enhancing security and efficiency.…”
Section: Related Work and Our Contribution A Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Over the last decade, extensive research has been conducted in areas of PUF-based authentication or AKE under various settings (e.g., IoT, RFID, smart meter system, and smart grid) [1], [5], [6], [8], [11], [12], [17], [18], [24], [25], [27], [29]- [32], [37], [39], [44], [45]. A PUF has been applied in an RFID authentication for enhancing security and efficiency.…”
Section: Related Work and Our Contribution A Related Workmentioning
confidence: 99%
“…Some attempts have been made to combine a password with PUFs [5], [6], [17], [39] for efficient authentication. These studies used a password as an input of a PUF to generate a long-term secret key.…”
Section: Related Work and Our Contribution A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Image encryption technology can prevent privacy leakage and can ensure secure image data sharing on cloud platforms. Conventional image encryption technology can be divided into two categories: full encryption [2][3][4][5][6] and selective encryption [7][8][9][10][11][12]. Full encryption serves to encrypt the complete image data, which not only causes high complexity and low efficiency but also cannot satisfy the rapid expansion of image data demand.…”
Section: Introductionmentioning
confidence: 99%
“…In fact, specific protocols have been presented with multi-factor authenticators (e.g. biometric, long-term secret, password) [2], [3], [13], [19], as compared in Table 1. They all have…”
Section: Introductionmentioning
confidence: 99%