On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols

@article{Rhrmair2013OnTP,
  title={On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols},
  author={Ulrich R{\"u}hrmair and Marten van Dijk},
  journal={Journal of Cryptographic Engineering},
  year={2013},
  volume={3},
  pages={17-28}
}
In recent years, PUF-based schemes have been suggested not only for the basic tasks of tamper-sensitive key storage or the identification of hardware systems, but also for more complex protocols like oblivious transfer (OT) or bit commitment (BC), both of which possess broad and diverse applications. In this paper, we continue this line of research. We first present an attack on two recent OT and BC protocols which have been introduced by Brzuska et al. (CRYPTO, LNCS 6841, pp 51–70, Springer… 

On the formal foundations of PUFs and related primitives

TLDR
This chapter provides a classification for past and ongoing work in physical disorder based security alongside with security analyses and implementation examples, and outlines some open problems and future research opportunities.

Group key establishment with physical unclonable functions

TLDR
A 4-round solution for group key establishment whose security relies on the availability of PUFs with appropriate guarantees is presented and can be realized without a random oracle by using a family of collision-resistant pseudorandom functions.

Secret-free security: a survey and tutorial

  • U. Rührmair
  • Computer Science, Mathematics
    Journal of Cryptographic Engineering
  • 2022
TLDR
The attempt of making hardware completely secret-free as promising endeavor in future hardware designs, at least in those application scenarios where this is logically possible and combined with standard PUFs and classical methods to construct hybrid systems with notably reduced attack surfaces are proposed.

SoK: Towards Secret-Free Security

TLDR
Systematization of Knowledge (SoK) paper tries to lay the foundations for future generations of secret-free hardware, which could be innately and provably immune against any invasive, side channel, or key extraction attacks.

A PUF taxonomy

TLDR
By carefully considering the physical mechanisms underpinning the operation of different PUFs, this review is able to form relationships between PUF technologies that previously had not been linked and look toward novel forms of PUF using physical principles that have yet to be exploited.

Combined Modeling and Side Channel Attacks on Strong PUFs

TLDR
The combination of machine-learning based modeling techniques with side channel information allows us to attack so-called XOR Arbiter PUFs and Lightweight PUFs up to a size and complexity that was previously out of reach.

Public Physical Unclonable Functions

TLDR
This work surveys representative PPUF architectures, related public protocols and trusted information flows, and related testing issues, and concludes by identifying the most important, challenging, and open P PUF-related problems.

Quo vadis, PUF?: Trends and challenges of emerging physical-disorder based security

The physical unclonable function (PUF) has emerged as a popular and widely studied security primitive based on the randomness of the underlying physical medium. To date, most of the research emphasis

Physical unclonable functions

TLDR
The development of physical unclonable functions, which exploit inherent randomness to give a physical entity a unique ‘fingerprint’ or trust anchor, are reviewed, considering the various potential applications of these devices and the security issues that they must confront.

Special session: How secure are PUFs really? On the reach and limits of recent PUF attacks

TLDR
This paper provides a short and easily accessible overview of the session at DATE 2014, and addresses the question of how strong and relevant are these attacks, and how secure are PUFs really.

References

SHOWING 1-10 OF 40 REFERENCES

Practical Security Analysis of PUF-Based Two-Player Protocols

TLDR
This paper presents an attack on two recent OT- and BC-protocols which have been introduced at CRYPTO 2011, discusses countermeasures against the attack, and shows that interactive hashing is suited to enhance the security of PUF-based OT and BC, albeit at the price of an increased round complexity.

Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results

TLDR
New PUF definitions that require only weak average security properties of the PUF are provided, and it is proved that these definitions suffice to realize secure PUF-based oblivious transfer (OT), bit com mitment (BC) and key exchange (KE) in said setting.

Physically Uncloneable Functions in the Universal Composition Framework

TLDR
This paper augments Canetti's universal composition (UC) framework by considering Physically Uncloneable Functions (PUFs) in the UC framework, and devise efficient UC-secure protocols for basic tasks like oblivious transfer, commitments, and key exchange.

Oblivious Transfer based on Physical Unclonable Functions ( Extended Abstract )

TLDR
This paper shows how OT can be implemented by Strong Physical Unclonable Functions (PUFs), and special attention is devoted to a recent subclass of Strong PUFs known as SHIC PU Fs.

An Attack on PUF-Based Session Key Exchange and a Hardware-Based Countermeasure: Erasable PUFs

TLDR
It is argued that Erasable PUFs could be implemented securely via ALILE-based crossbar structures due to the observed security issue in protocols for session key exchange that are based on Strong Physical Unclonable Functions.

Oblivious Transfer Based on Physical Unclonable Functions

TLDR
This paper shows how OT can be implemented by Strong Physical Unclonable Functions (PUFs), and special attention is thereby devoted to a recent subclass of Strong PUFs known as SHIC PUFs.

A Formalization of the Security Features of Physical Functions

TLDR
This paper presents a formal foundation for security primitives based on Physical Unclonable Functions and formally defines the main properties at the heart of most published works on PUFs: robustness, unclonability, and unpredictability and shows that they can be achieved by previously introduced PUF instantiations.

A Formal Foundation for the Security Features of Physical Functions

TLDR
This paper presents a formal foundation for security primitives based on Physical Unclonable Functions and focuses more on the main properties at the heart of most published works on PUFs: robustness, unclonability, and unpredictability.

Security Based on Physical Unclonability and Disorder

TLDR
This chapter provides a classification for past and ongoing work in physical disorder based security alongside with security analyses and implementation examples and outlines some open problems and future research opportunities.

Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions

TLDR
A major step towards understanding and securely using PUFs was recently taken in [Crypto 2011] where Brzuska, Fischlin, Schroder and Katzenbeisser model PUFs in the Universal Composition (UC) framework of Canetti.