Title
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions.
Abstract
Physically Uncloneable Functions (PUFs) [28] are noisy physical sources of randomness. As such, they are naturally appealing for cryptographic applications, and have caught the interest of both theoreticians and practitioners. A major step towards understanding and securely using PUFs was recently taken in [Crypto 2011] where Brzuska, Fischlin, Schroder and Katzenbeisser model PUFs in the Universal Composition (UC) framework of Canetti [FOCS 2001]. A salient feature of their model is that it considers trusted PUFs only; that is, PUFs which have been produced via the prescribed manufacturing process and are guaranteed to be free of any adversarial influence. However, this does not accurately reflect real-life scenarios, where an adversary could be able to create and use malicious PUFs. The goal of this work is to extend the model proposed in [Crypto 2011] in order to capture such a real-world attack. The main contribution of this work is the study of the Malicious PUFs model. To this end, we first formalize the notion of "malicious" PUFs, and extend the UC formulation of Brzuska et al. to allow the adversary to create PUFs with arbitrary adversarial behaviour. Then, we provide positive results in this, more realistic, model. We show that, under computational assumptions, it is possible to UC-securely realize any functionality.
Year
DOI
Venue
2012
10.1007/978-3-642-38348-9_41
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013
DocType
Volume
ISSN
Journal
7881
0302-9743
Citations 
PageRank 
References 
24
0.87
46
Authors
4
Name
Order
Citations
PageRank
Rafail Ostrovsky18743588.15
Alessandra Scafuro220514.00
Ivan Visconti361240.30
Akshay Wadia41396.78