2015
DOI: 10.1007/978-3-662-48324-4_28
|View full text |Cite
|
Sign up to set email alerts
|

End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol

Abstract: We demonstrate a prototype implementation of a provably secure protocol that supports privacy-preserving mutual authentication between a server and a constrained device. Our proposed protocol is based on a physically unclonable function (PUF) and it is optimized for resource-constrained platforms. The reported results include a full protocol analysis, the design of its building blocks, their integration into a constrained device, and finally its performance evaluation. We show how to obtain efficient implement… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
91
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 81 publications
(96 citation statements)
references
References 34 publications
0
91
0
Order By: Relevance
“…As such, we reveal a fundamental flaw in the reverse fuzzy extractor, proposed by Van Herrewege et al [28] at Financial Crypto 2012. The latter lightweight primitive is gaining momentum and has also been adopted in the CHES 2015 protocol of Aysu et al [1]. We debunk the main security claim that repeated helper data exposure does not result in additional min-entropy loss.…”
Section: Contributionmentioning
confidence: 94%
See 4 more Smart Citations
“…As such, we reveal a fundamental flaw in the reverse fuzzy extractor, proposed by Van Herrewege et al [28] at Financial Crypto 2012. The latter lightweight primitive is gaining momentum and has also been adopted in the CHES 2015 protocol of Aysu et al [1]. We debunk the main security claim that repeated helper data exposure does not result in additional min-entropy loss.…”
Section: Contributionmentioning
confidence: 94%
“…The latter attacks comprehend the modeling of the highly correlated arbiter PUF via repeated helper data exposure; a preemptive fix can be found in the PhD thesis of Maes [19]. The newly revealed flaw is more fundamentally linked to the reverse fuzzy extractor primitive and applies to all existing protocols so far [28,19,1]. Observe in Fig.…”
Section: A Fundamental Security Flaw In Reverse Fuzzy Extractorsmentioning
confidence: 99%
See 3 more Smart Citations