Towards a Unified Security Model for Physically Unclonable Functions

被引:22
作者
Armknecht, Frederik [1 ]
Moriyama, Daisuke [2 ]
Sadeghi, Ahmad-Reza [3 ]
Yung, Moti [4 ,5 ]
机构
[1] Univ Mannheim, D-68131 Mannheim, Germany
[2] NICT, Koganei, Tokyo, Japan
[3] Tech Univ Darmstadt, Darmstadt, Germany
[4] Google, New York, NY USA
[5] Columbia Univ, New York, NY USA
来源
TOPICS IN CRYPTOLOGY - CT-RSA 2016 | 2016年 / 9610卷
关键词
Physically unclonable function; Security model; Specifications;
D O I
10.1007/978-3-319-29485-8_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The use of Physically Unclonable Functions (PUFs) in cryptographic protocols attracted an increased interest over recent years. Since sound security analysis requires a concise specification of the alleged properties of the PUF, there have been numerous trials to provide formal security models for PUFs. However, all these approaches have been tailored to specific types of applications or specific PUF instantiations. For the sake of applicability, composability, and comparability, however, there is a strong need for a unified security model for PUFs (to satisfy, for example, a need to answer whether a future protocol requirements match a new and coming PUF realization properties). In this work, we propose a PUF model which generalizes various existing PUF models and includes security properties that have not been modeled so far. We prove the relation between some of the properties, and also discuss the relation of our model to existing ones.
引用
收藏
页码:271 / 287
页数:17
相关论文
共 31 条
[1]  
[Anonymous], 2001, Ph.D. thesis
[2]   A Formal Foundation for the Security Features of Physical Functions [J].
Armknecht, Frederik ;
Maes, Roel ;
Sadeghi, Ahmad-Reza ;
Standaert, Francois-Xavier ;
Wachsmann, Christian .
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, :397-412
[3]  
Armknecht F, 2009, LECT NOTES COMPUT SC, V5912, P685, DOI 10.1007/978-3-642-10366-7_40
[4]  
Bösch C, 2008, LECT NOTES COMPUT SC, V5154, P181, DOI 10.1007/978-3-540-85053-3_12
[5]  
Boureanu I., 2015, CCS, P381
[6]  
Brzuska C, 2011, LECT NOTES COMPUT SC, V6841, P51, DOI 10.1007/978-3-642-22792-9_4
[7]  
Busch H, 2009, LECT NOTES COMPUT SC, V5932, P296, DOI 10.1007/978-3-642-10838-9_22
[8]  
Dachman-Soled D, 2014, LECT NOTES COMPUT SC, V8617, P405, DOI 10.1007/978-3-662-44381-1_23
[9]  
Delvaux J., 2014, SURVEY LIGHTWEIGHT E, P977
[10]   Fuzzy extractors: How to generate strong keys from biometrics and other noisy data [J].
Dodis, Yevgeniy ;
Ostrovsky, Rafail ;
Reyzin, Leonid ;
Smith, Adam .
SIAM JOURNAL ON COMPUTING, 2008, 38 (01) :97-139