2012
DOI: 10.1007/978-3-642-30921-2_9
|View full text |Cite
|
Sign up to set email alerts
|

Converse PUF-Based Authentication

Abstract: Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a PUF, wants to authenticate to a resource-rich verifier, who has access to a database of pre-measured PUF challenge-response pairs (CRPs). In this paper we consider application scenarios where all previous PUF-based authentication schemes fail to work: The verif… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
21
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 38 publications
(22 citation statements)
references
References 31 publications
1
21
0
Order By: Relevance
“…Several PUF-based protocols have been proposed, in particular for the subclass of so-called strong PUFs. We review the most prominent proposals: controlled PUFs [4][5][6],Öztürk et al [17], Hammouri et al [8], logically reconfigurable PUFs [11], reverse fuzzy extractors (FEs) [24], slender PUFs [16,20] and the converse protocol [12]. The novelty of our work is threefold.…”
Section: Introductionmentioning
confidence: 99%
“…Several PUF-based protocols have been proposed, in particular for the subclass of so-called strong PUFs. We review the most prominent proposals: controlled PUFs [4][5][6],Öztürk et al [17], Hammouri et al [8], logically reconfigurable PUFs [11], reverse fuzzy extractors (FEs) [24], slender PUFs [16,20] and the converse protocol [12]. The novelty of our work is threefold.…”
Section: Introductionmentioning
confidence: 99%
“…Rührmair et al presented a modeling attack for several PUF models including arbiter PUFs and ring oscillator PUFs [38]. To eliminate these issues, the converse PUF-based authentication protocol has been proposed in [39], where the verifier is considered a resource-constrained device, and the prover is considered a resource-rich server. A hardware and software co-verification based lightweight IoT authentication scheme is presented in [40].…”
Section: Prior Workmentioning
confidence: 99%
“…A sample database is shown in Figure 2 where the rows store data for each fielded chip and the columns store digitized rising (PNR) and falling (PNF) path delays as n-bit fixed-point numbers, typically ranging in value between 100 and 500. There are several significant benefits to storing PN instead of response bit-strings [18][19][20][21][22][23]. First, the relationship of PN to response bit-strings is one-to-many (i.e., a large number of response bitstrings can be generated from a much smaller set of PN).…”
Section: Enrollment and Regenerationmentioning
confidence: 99%
“…These goals are achieved by using only linear operations to process the stored and regenerated PN into session keys and authentication bit-strings. Other PUFs [1,[18][19][20][21][22][23] can be used instead of HELP to meet these goals as long as they possess the following properties:…”
Section: Enrollment and Regenerationmentioning
confidence: 99%