PUF ROKs: a hardware approach to read-once keys

@inproceedings{Kirkpatrick2011PUFRA,
  title={PUF ROKs: a hardware approach to read-once keys},
  author={Michael S. Kirkpatrick and Sam Kerr and Elisa Bertino},
  booktitle={AsiaCCS},
  year={2011}
}
Cryptographers have proposed the notion of read-once keys (ROKs) as a beneficial tool for a number of applications, such as delegation of authority. The premise of ROKs is that the key is destroyed by the process of reading it, thus preventing subsequent accesses. While the idea and the applications are well-understood, the consensus among cryptographers is that ROKs cannot be produced by algorithmic processes alone. Rather, a trusted hardware mechanism is needed to support the destruction of… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.
4 Citations
7 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-4 of 4 extracted citations

References

Publications referenced by this paper.
Showing 1-7 of 7 references

Reed-solomon codes. http://www.cs.cmu.edu/afs/cs.cmu.edu/project/ pscico-guyb/realworld/www/reedsolomon/reed_ solomon_codes.html

  • M. Riley, I. Richardson
  • 1998
Highly Influential
3 Excerpts

Similar Papers

Loading similar papers…