Converse PUF-based authentication

U. Kocabas, Andreas Peter, S. Katzenbeisser, A. Sadeghi

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    38 Citations (Scopus)
    147 Downloads (Pure)


    Physically Unclonable Functions (PUFs) are key tools in the construction of lightweight authentication and key exchange protocols. So far, all existing PUF-based authentication protocols follow the same paradigm: A resource-constrained prover, holding a PUF, wants to authenticate to a resource-rich verifier, who has access to a database of pre-measured PUF challenge-response pairs (CRPs). In this paper we consider application scenarios where all previous PUF-based authentication schemes fail to work: The verifier is resource-constrained (and holds a PUF), while the prover is resource-rich (and holds a CRP-database). We construct the first and efficient PUF-based authentication protocol for this setting, which we call converse PUF-based authentication. We provide an extensive security analysis against passive adversaries, show that a minor modification also allows for authenticated key exchange and propose a concrete instantiation using controlled Arbiter PUFs.
    Original languageUndefined
    Title of host publication5th International Conference on Trust and Trustworthy Computing, TRUST 2012
    Place of PublicationBerlin
    Number of pages17
    ISBN (Print)978-3-642-30920-5
    Publication statusPublished - Jun 2012
    Event5th International Conference on Trust and Trustworthy Computing 2012 - Vienna, Austria
    Duration: 13 Jun 201215 Jun 2012
    Conference number: 5

    Publication series

    NameLecture Notes in Computer Science
    PublisherSpringer Verlag
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349


    Conference5th International Conference on Trust and Trustworthy Computing 2012
    Abbreviated titleTRUST 2012


    • EWI-23750
    • SCS-Cybersecurity
    • Physically Unclonable Functions (PUFs
    • METIS-300027
    • IR-87349
    • Authentication
    • Key Exchange

    Cite this