2008
DOI: 10.1145/1284680.1284683
|View full text |Cite
|
Sign up to set email alerts
|

Controlled physical random functions and applications

Abstract: The cryptographic protocols that we use in everyday life rely on the secure storage of keys in consumer devices. Protecting these keys from invasive attackers, who open a device to steal its key, is a challenging problem. We propose controlled physical random functions (CPUFs) as an alternative to storing keys and describe the core protocols that are needed to use CPUFs. A physical random functions (PUF) is a physical system with an input and output. The functional relationship between input and output looks l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
88
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 101 publications
(88 citation statements)
references
References 20 publications
0
88
0
Order By: Relevance
“…Controlled PUFs [13][14][15][16] provide reinforcement against modeling via a cryptographic hash function (oneway). Two instances, preceding and succeeding the PUF respectively, are shown in Figure 7(b).…”
Section: Controlled Pufs (November 2002)mentioning
confidence: 99%
“…Controlled PUFs [13][14][15][16] provide reinforcement against modeling via a cryptographic hash function (oneway). Two instances, preceding and succeeding the PUF respectively, are shown in Figure 7(b).…”
Section: Controlled Pufs (November 2002)mentioning
confidence: 99%
“…So-called controlled PUFs enhance the security of CRP-based authentication via additional hardware [2]. Hereby, the response bits of the strong PUF are post-processed using a fuzzy extractor.…”
Section: Securitymentioning
confidence: 99%
“…In effect, the CPUF is a sort of trusted computing environment. In Gassend et al [6,7,8] a way was presented to employ this trusted environment for the purpose of outsourcing computations. The idea is roughly as follows.…”
Section: Controlled Pufsmentioning
confidence: 99%
“…In the construction of [6] the proof is verifiable only by the user who sends the task to the CPUF. In [8] this was generalized to a proof ('E-proof') that can be verified by third parties as well. The above scheme provides a way for users to outsource computations and be certain that their program was correctly executed, by the designated device, yielding the given result.…”
Section: Controlled Pufsmentioning
confidence: 99%
See 1 more Smart Citation