3PAA: A Private PUF Protocol for Anonymous Authentication

被引:34
作者
Chaterjee, Urbi [1 ]
Mukhopadhyay, Debdeep [1 ]
Chakraborty, Rajat Subhra [1 ]
机构
[1] IIT Kharagpur, Dept Comp Sci & Engn, Secure Embedded Architecture Lab SEAL, Kharagpur 721302, W Bengal, India
关键词
Cryptographic protocols; trusted platform module (TPM); anonymous authentication; Internet of Things (IoTs); physically unclonable functions (PUFs); bilinear pairing; revocation;
D O I
10.1109/TIFS.2020.3021917
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Anonymous authentication (AA) schemes are used by an application provider to grant services to its n users for pre-defined k times after they have authenticated themselves anonymously. These privacy-preserving cryptographic schemes are essentially based on the secret key that is embedded in a trusted platform module (TPM). In this work, we propose a private physically unclonable function (PUF) based scheme that overcomes the shortcomings of prior attempts to incorporate PUF for AA schemes. Traditional PUF based authentication protocols have their limitations as they only work based on challenge-response pairs (CRPs) exposed to the verifier, thus violating the principle of anonymity. Here, we ensure that even if the PUF instance is private to the user, it can be used for authentication to the application provider. Besides, no raw CRPs need to be stored in a secure database, thus making it more difficult for an adversary to launch model-building attacks on the deployed PUFs. We reduce the execution time from O(n) to O(1) and storage overhead from O(nk) to O(n) compared to state-of-the-art AA protocols and also dispense the necessity of maintaining a revocation list for the compromised keys. In addition, we provide security proofs of the protocol under Elliptic Curve Diffie-Hellman assumption and decisional uniqueness assumption of a PUF. A prototype of the protocol has been implemented on a Z-Turn board integrated with dual-core ARM Cortex-A9 processor and Artix-7 FPGA. The resource footprint and performance characterization results show that the proposed scheme is suitable for implementation on resource-constrained platforms.
引用
收藏
页码:756 / 769
页数:14
相关论文
共 25 条
  • [1] Multi-Channel Distributed DSA Networks: Connectivity and Rendezvous Tradeoffs
    Al Tameemi, Osama Abbas Hussein
    Al-Rumaithi, Ayad
    Chatterjee, Mainak
    Kwiat, Kevin A.
    Kamhoua, Charles A.
    [J]. IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2017, 3 (01) : 67 - 81
  • [2] Constant-Size Dynamic k-Times Anonymous Authentication
    Au, Man Ho
    Susilo, Willy
    Mu, Yi
    Chow, Sherman S. M.
    [J]. IEEE SYSTEMS JOURNAL, 2013, 7 (02): : 249 - 261
  • [3] End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol
    Aysu, Aydin
    Gulcan, Ege
    Moriyama, Daisuke
    Schaumont, Patrick
    Yung, Moti
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 556 - 576
  • [4] BANERJEE S, 2019, 2019 INT C OPT APPL
  • [5] Boneh D., 2004, CCS 04, P168
  • [6] Boudot F, 2000, LECT NOTES COMPUT SC, V1807, P431
  • [7] BRICKELL E, 2007, ENHANCED PRIVACY ID
  • [8] Brickell E. F., 2004, P 11 ACM C COMP COMM, P132, DOI DOI 10.1109/TSC.2010.60
  • [9] Brickell E, 2010, LECT NOTES COMPUT SC, V6101, P181, DOI 10.1007/978-3-642-13869-0_12
  • [10] Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database
    Chatterjee, Urbi
    Govindan, Vidya
    Sadhukhan, Rajat
    Mukhopadhyay, Debdeep
    Chakraborty, Rajat Subhra
    Mahata, Debashis
    Prabhu, Mukesh M.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (03) : 424 - 437