Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions

被引:0
|
作者
Ostrovsky, Rafail [1 ,2 ]
Scafuro, Alessandra [1 ]
Visconti, Ivan [3 ]
Wadia, Akshay [1 ]
机构
[1] Univ Calif Los Angeles, Dept Comp Sci, Los Angeles, CA 90024 USA
[2] Univ Calif Los Angeles, Dept Math, Los Angeles, CA 90024 USA
[3] Univ Salerno, Dipartimento Informat, Salerno, Italy
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013 | 2013年 / 7881卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Physically Uncloneable Functions (PUFs) [28] are noisy physical sources of randomness. As such, they are naturally appealing for cryptographic applications, and have caught the interest of both theoreticians and practitioners. A major step towards understanding and securely using PUFs was recently taken in [Crypto 2011] where Brzuska, Fischlin, Schroder and Katzenbeisser model PUFs in the Universal Composition (UC) framework of Canetti [FOCS 2001]. A salient feature of their model is that it considers trusted PUFs only; that is, PUFs which have been produced via the prescribed manufacturing process and are guaranteed to be free of any adversarial influence. However, this does not accurately reflect real-life scenarios, where an adversary could be able to create and use malicious PUFs. The goal of this work is to extend the model proposed in [Crypto 2011] in order to capture such a real-world attack. The main contribution of this work is the study of the Malicious PUFs model. To this end, we first formalize the notion of "malicious" PUFs, and extend the UC formulation of Brzuska et al. to allow the adversary to create PUFs with arbitrary adversarial behaviour. Then, we provide positive results in this, more realistic, model. We show that, under computational assumptions, it is possible to UC-securely realize any functionality.
引用
收藏
页码:702 / 718
页数:17
相关论文
共 50 条
  • [31] Adaptively secure feldman VSS and applications to universally-composable threshold cryptography
    Abe, M
    Fehr, S
    ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 317 - 334
  • [32] Universally composable secure proxy re-signature scheme with effective calculation
    Hong, Xuan
    Gao, Jianhua
    Pan, Jianguo
    Zhang, Bo
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S10075 - S10084
  • [33] Universally Composable Secure TNC Protocol Based on IF-T Binding to TLS
    Zhao, Shijun
    Zhang, Qianying
    Qin, Yu
    Feng, Dengguo
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 110 - 123
  • [34] Universally composable multi-party computation with an unreliable common reference string
    Coyal, Vipul
    Katz, Jonathan
    THEORY OF CRYPTOGRAPHY, 2008, 4948 : 142 - +
  • [35] Feasibility and Infeasibility of Secure Computation with Malicious PUFs
    Dachman-Soled, Dana
    Fleischhacker, Nils
    Katz, Jonathan
    Lysyanskaya, Anna
    Schroeder, Dominique
    JOURNAL OF CRYPTOLOGY, 2020, 33 (02) : 595 - 617
  • [36] Secure Maximum (Minimum) Computation in Malicious Model
    Li S.-D.
    Xu W.-T.
    Wang W.-L.
    Zhang M.-Y.
    1600, Science Press (44): : 2076 - 2089
  • [37] Feasibility and Infeasibility of Secure Computation with Malicious PUFs
    Dachman-Soled, Dana
    Fleischhacker, Nils
    Katz, Jonathan
    Lysyanskaya, Anna
    Schroeder, Dominique
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 405 - 420
  • [38] Feasibility and Infeasibility of Secure Computation with Malicious PUFs
    Dana Dachman-Soled
    Nils Fleischhacker
    Jonathan Katz
    Anna Lysyanskaya
    Dominique Schröder
    Journal of Cryptology, 2020, 33 : 595 - 617
  • [39] Universally composable secure geographic area verification without pre-shared secret
    Junwei ZHANG
    Ning LU
    Jianfeng MA
    Chao YANG
    ScienceChina(InformationSciences), 2019, 62 (03) : 175 - 189
  • [40] Universally composable secure TNC model and EAP-TNC protocol in IF-T
    JunWei Zhang
    JianFeng Ma
    SangJae Moon
    Science China Information Sciences, 2010, 53 : 465 - 482