Title | ||
---|---|---|
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions. |
Abstract | ||
---|---|---|
Physically Uncloneable Functions (PUFs) [28] are noisy physical sources of randomness. As such, they are naturally appealing for cryptographic applications, and have caught the interest of both theoreticians and practitioners. A major step towards understanding and securely using PUFs was recently taken in [Crypto 2011] where Brzuska, Fischlin, Schroder and Katzenbeisser model PUFs in the Universal Composition (UC) framework of Canetti [FOCS 2001]. A salient feature of their model is that it considers trusted PUFs only; that is, PUFs which have been produced via the prescribed manufacturing process and are guaranteed to be free of any adversarial influence. However, this does not accurately reflect real-life scenarios, where an adversary could be able to create and use malicious PUFs. The goal of this work is to extend the model proposed in [Crypto 2011] in order to capture such a real-world attack. The main contribution of this work is the study of the Malicious PUFs model. To this end, we first formalize the notion of "malicious" PUFs, and extend the UC formulation of Brzuska et al. to allow the adversary to create PUFs with arbitrary adversarial behaviour. Then, we provide positive results in this, more realistic, model. We show that, under computational assumptions, it is possible to UC-securely realize any functionality. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1007/978-3-642-38348-9_41 | ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013 |
DocType | Volume | ISSN |
Journal | 7881 | 0302-9743 |
Citations | PageRank | References |
24 | 0.87 | 46 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Rafail Ostrovsky | 1 | 8743 | 588.15 |
Alessandra Scafuro | 2 | 205 | 14.00 |
Ivan Visconti | 3 | 612 | 40.30 |
Akshay Wadia | 4 | 139 | 6.78 |