PUF ROKs: a hardware approach to read-once keys

  title={PUF ROKs: a hardware approach to read-once keys},
  author={Michael S. Kirkpatrick and Sam Kerr and Elisa Bertino},
Cryptographers have proposed the notion of read-once keys (ROKs) as a beneficial tool for a number of applications, such as delegation of authority. The premise of ROKs is that the key is destroyed by the process of reading it, thus preventing subsequent accesses. While the idea and the applications are well-understood, the consensus among cryptographers is that ROKs cannot be produced by algorithmic processes alone. Rather, a trusted hardware mechanism is needed to support the destruction of… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.
4 Citations
7 References
Similar Papers


Publications citing this paper.
Showing 1-4 of 4 extracted citations


Publications referenced by this paper.
Showing 1-7 of 7 references

Reed-solomon codes. http://www.cs.cmu.edu/afs/cs.cmu.edu/project/ pscico-guyb/realworld/www/reedsolomon/reed_ solomon_codes.html

  • M. Riley, I. Richardson
  • 1998
Highly Influential
3 Excerpts

Similar Papers

Loading similar papers…