Filters








10 Hits in 3.8 sec

PUFs in Security Protocols: Attack Models and Security Evaluations

U. Ruhrmair, M. van Dijk
2013 2013 IEEE Symposium on Security and Privacy  
They reach from a clean, first setting termed the "stand-alone, good PUF model" to stronger scenarios like the "bad PUF model" and the "PUF re-use model".  ...  We argue why these attack models are realistic, and that existing protocols would be faced with them if used in practice.  ...  ACKNOWLEDGEMENTS The authors would like to thank Jürg Wullschleger for enjoyable discussions and his contributions on the bad PUF model and challenge-logging PUFs.  ... 
doi:10.1109/sp.2013.27 dblp:conf/sp/RuhrmairD13 fatcat:i5bjsoqmzfbgvc6fggszv526uu

Unconditionally Secure and Universally Composable Commitments from Physical Assumptions [chapter]

Ivan Damgård, Alessandra Scafuro
2013 Lecture Notes in Computer Science  
Besides allowing us to prove feasibility of unconditional UC-security with (malicious) PUFs and stateless tokens, our compiler can be instantiated with any ideal straight-line extractable commitment scheme  ...  Similarly, with stateless tokens, UC-secure commitments are known only under computational assumptions [13, 24, 15] , while the (not UC) unconditional commitment scheme of [23] is secure only in a weaker  ...  Nevertheless, [36] shows that even with malicious PUFs it is possible to achieve UC-secure computations relying on computational assumptions.  ... 
doi:10.1007/978-3-642-42045-0_6 fatcat:gb7t4x5z5rdtxjovhxxbm3baxq

A Private Quantum Bit String Commitment

Mariana Gama, Paulo Mateus, André Souto
2020 Entropy  
The protocol remains secure and private (but not composable) if we realize the random oracles as physical unclonable functions (PUFs) in the so-called bad PUF model.  ...  Since then, it was shown in [24] that commitments with unconditional security can be obtained in the malicious PUF model and, in [25] , an unconditional UC commitment in a stronger adversarial model  ...  a computational UC commitment scheme.  ... 
doi:10.3390/e22030272 pmid:33286046 pmcid:PMC7516725 fatcat:3h4do3wu5bcz5po7fklmpuur5m

From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions [chapter]

Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade, Tobias Nilges
2015 Lecture Notes in Computer Science  
We present two compilers that transform UC-secure protocols in the stateful hardware model into UC-secure protocols in the resettable hardware model.  ...  Universally composable multi-party computation is impossible without setup assumptions.  ...  authors acknowledge support from the Danish National Research Foundation and The National Science Foundation of China (under the grant 61061130540) for the Sino-Danish Center for the Theory of Interactive Computation  ... 
doi:10.1007/978-3-319-26059-4_2 fatcat:rbttqcxwz5btfj6xhxwcgkk3i4

Minimal assumptions in cryptography [article]

Nils Fleischhacker, Universität Des Saarlandes, Universität Des Saarlandes
2017
We establish that assuming the existence of physically uncloneable functions (PUF), a specific kind of secure hardware, is not by itself sufficient to allow for secure two-party computation protocols without  ...  "On Statistically Secure Obfuscation with Approximate Correctness".  ...  ) with unconditional security.  ... 
doi:10.22028/d291-26696 fatcat:5whfuce6yndyzpnbs3ih2gicja

Wireless Sensor Network Security

An Liu, Mihui Kim, Leonardo B. Oliveira, Hailun Tan
2013 International Journal of Distributed Sensor Networks  
While digital signatures and MACs can provide computational security, authentication codes are conceived to provide unconditional security.  ...  exchanging information with computationally robust nodes.  ...  Although organizations and forums seem to agree to the increasing need for secure systems with wide strength, security is a of the algorithm, this primitive does not provide the same security than others  ... 
doi:10.1155/2013/362385 fatcat:2ph46uukonbtbdkc5q6t4mvgcq

Cryptographic Protocols from Physical Assumptions

Alexander Koch
2019
Unconditional UC-security in the (stateful) malicious PUF-setting has only be attained for commitment protocols, cf. [DS13] . Indeed, Dachman-Soled et al.  ...  In the setting of stateful malicious PUFs, Ostrovsky et al. [OSVW13] present a protocol for secure computation that achieves computational UC-security.  ...  UC Framework" [AGH + 19b], with some changes to account for the slightly different viewpoint taken on in this thesis.  ... 
doi:10.5445/ir/1000097756 fatcat:vtwuxy4kzreuhm7wwce6fsegze

Formal analysis and applications of direct anonymous attestation

Jorden D. Whitefield
2019
It enables secure operations to be performed within vehicles without relying on constant message exchange with infrastructure.  ...  Such architectures detail how entities (vehicles, road-side units, etc.) communicate with each other and how their credentials need to be revoked when they become malicious so that they cannot continue  ...  [102] propose to use TCs to store pseudonyms in secure storage and use a physical-unclonable function (PUF) to reduce the need for large amounts of secure storage.  ... 
doi:10.15126/thesis.00852100 fatcat:3g3hdczz5bexbepzrnnwk6gbhu

Easton Gazette, and Eastern Shore Intelligencer 11-1819

(:Unkn) Unknown
1819
Interest from the day of sale, the purchaser or purchasers, to give their notes with approved-security.  ...  close with your offer, And quitting my puffing and shaving, for rhymes, . .':... > .* > . .... ' Shall now try my hand at ft touch* tithe times.  ...  Sufficient security for hw appear. knee in Somerset county Court befbre the ' ' judges thereof on the first Saturday after the .'  ... 
doi:10.13016/m27d2q74g fatcat:y5h5qdp7lzd5jbmkpbm7vvawzq

Larry's clique: the informal side of the housing market in low-income minority neighborhoods

Clement Thery
2017
Instead of framing the housing market as a spatial mechanism, this research looks at the housing market as a set of varied economic circuits that plug into a local social life with the goal of extracting  ...  Andres claims to have attended UC Berkeley in the mid--1990s, but had to interrupt his college education.  ...  I ask. 25 "A promissory note is a written, signed, unconditional promise to pay a certain amount of money on demand at a specified time.  ... 
doi:10.7916/d87m06rr fatcat:hktyfeko45a6ndfeq7ihqrofem