13
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found

      Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs

      other

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references33

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          Universally composable security: a new paradigm for cryptographic protocols

          R. Canetti (2025)
            Bookmark
            • Record: found
            • Abstract: found
            • Article: not found

            Physical one-way functions.

            Modern cryptographic practice rests on the use of one-way functions, which are easy to evaluate but difficult to invert. Unfortunately, commonly used one-way functions are either based on unproven conjectures or have known vulnerabilities. We show that instead of relying on number theory, the mesoscopic physics of coherent transport through a disordered medium can be used to allocate and authenticate unique identifiers by physically reducing the medium's microstructure to a fixed-length string of binary digits. These physical one-way functions are inexpensive to fabricate, prohibitively difficult to duplicate, admit no compact mathematical representation, and are intrinsically tamper-resistant. We provide an authentication protocol based on the enormous address space that is a principal characteristic of physical one-way functions.
              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              FPGA Intrinsic PUFs and Their Use for IP Protection

                Bookmark

                Author and book information

                Book Chapter
                2017
                April 01 2017
                : 382-411
                10.1007/978-3-319-56620-7_14
                924897b6-8c64-48e3-82a4-243e80c56790
                History

                Comments

                Comment on this book

                Book chapters

                Similar content1,967