Converse PUF-based authentication

U. Kocabas, Andreas Peter, S. Katzenbeisser, A. Sadeghi

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    18 Citations (Scopus)
    57 Downloads (Pure)

    Abstract

    Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a PUF, wants to authenticate to a resource-rich verifier, who has access to a database of pre-measured PUF challenge-response pairs (CRPs). In this paper we consider application scenarios where all previous PUF-based authentication schemes fail to work: The verifier is resource-constrained (and holds a PUF), while the prover is resource-rich (and holds a CRP-database). We construct the first and efficient PUF-based authentication protocol for this setting, which we call converse PUF-based authentication. We provide an extensive security analysis against passive adversaries, show that a minor modification also allows for authenticated key exchange and propose a concrete instantiation using controlled Arbiter PUFs.
    Original languageUndefined
    Title of host publication5th International Conference on Trust and Trustworthy Computing, TRUST 2012
    Place of PublicationBerlin
    PublisherSpringer
    Pages142-158
    Number of pages17
    ISBN (Print)978-3-642-30920-5
    DOIs
    Publication statusPublished - Jun 2012
    Event5th International Conference on Trust and Trustworthy Computing 2012 - Vienna, Austria
    Duration: 13 Jun 201215 Jun 2012
    Conference number: 5

    Publication series

    NameLecture Notes in Computer Science
    PublisherSpringer Verlag
    Volume7344
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Conference

    Conference5th International Conference on Trust and Trustworthy Computing 2012
    Abbreviated titleTRUST 2012
    CountryAustria
    CityVienna
    Period13/06/1215/06/12

    Keywords

    • EWI-23750
    • SCS-Cybersecurity
    • Physically Unclonable Functions (PUFs
    • METIS-300027
    • IR-87349
    • Authentication
    • Key Exchange

    Cite this

    Kocabas, U., Peter, A., Katzenbeisser, S., & Sadeghi, A. (2012). Converse PUF-based authentication. In 5th International Conference on Trust and Trustworthy Computing, TRUST 2012 (pp. 142-158). (Lecture Notes in Computer Science; Vol. 7344). Berlin: Springer. https://doi.org/10.1007/978-3-642-30921-2_9