2019
DOI: 10.1109/access.2019.2931472
|View full text |Cite
|
Sign up to set email alerts
|

End-to-End Authenticated Key Exchange Based on Different Physical Unclonable Functions

Abstract: We propose the first authenticated key exchange (AKE) protocol with different physical unclonable functions (PUFs). Our protocol allows for two end-users each holding a distinct PUF-embedded device and a long-term secret to agree to an authenticated session key. For malicious behaviors on the PUF-embedded device, we first define a Device query, which models an adversary who intentionally (or unintentionally) picks up an arbitrary device and attempts to input a message and obtain an output. As per the author's … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(12 citation statements)
references
References 40 publications
0
12
0
Order By: Relevance
“…Most of the existing PUF technologies such as DRAM PUFs utilize helper data algorithms and ECCs to improve the reliability and robustness [ 14 , 19 , 20 , 28 , 29 , 30 ]. However, using helper data may leak some information about the secret keys, and ECC circuits cause significant hardware and software overheads.…”
Section: Background and Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…Most of the existing PUF technologies such as DRAM PUFs utilize helper data algorithms and ECCs to improve the reliability and robustness [ 14 , 19 , 20 , 28 , 29 , 30 ]. However, using helper data may leak some information about the secret keys, and ECC circuits cause significant hardware and software overheads.…”
Section: Background and Motivationmentioning
confidence: 99%
“…Most of the existing PUF-based authentication methods for IoT applications exploit strong PUFs, such as delay-based PUFs, which require dedicated circuits. Additionally, most of these methods rely on complex error correction algorithms to extract reliable responses, leading to add extra overheads to the device [ 19 , 20 ]. Using DRAMs as the major components of many devices can eliminate the need for dedicated PUF circuits.…”
Section: Introductionmentioning
confidence: 99%
“…We use the same notion of session identifier, partner id, partnering as it is defined in [3], [9]. Definition 12 (Session Identifier, Partner id, and Partnering [3], [9] 4). On the other hand, all C(U , 1), C(U , 2), C(U , 3), and C(U , 4) are true then it also becomes true regardless of C(S, 1) and C(S, 2).…”
Section: J Smentioning
confidence: 99%
“…It has been the first attempt to generally build a PUF-based multi-factor AKE with provable security. Very recently, a new end-to-end different PUF-based authentication has been proposed by Byun [4]. It enables for two different users who each has own distinct PUF-embedded device to establish an authenticated key exchange [4].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation