Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions

被引:0
|
作者
Ostrovsky, Rafail [1 ,2 ]
Scafuro, Alessandra [1 ]
Visconti, Ivan [3 ]
Wadia, Akshay [1 ]
机构
[1] Univ Calif Los Angeles, Dept Comp Sci, Los Angeles, CA 90024 USA
[2] Univ Calif Los Angeles, Dept Math, Los Angeles, CA 90024 USA
[3] Univ Salerno, Dipartimento Informat, Salerno, Italy
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Physically Uncloneable Functions (PUFs) [28] are noisy physical sources of randomness. As such, they are naturally appealing for cryptographic applications, and have caught the interest of both theoreticians and practitioners. A major step towards understanding and securely using PUFs was recently taken in [Crypto 2011] where Brzuska, Fischlin, Schroder and Katzenbeisser model PUFs in the Universal Composition (UC) framework of Canetti [FOCS 2001]. A salient feature of their model is that it considers trusted PUFs only; that is, PUFs which have been produced via the prescribed manufacturing process and are guaranteed to be free of any adversarial influence. However, this does not accurately reflect real-life scenarios, where an adversary could be able to create and use malicious PUFs. The goal of this work is to extend the model proposed in [Crypto 2011] in order to capture such a real-world attack. The main contribution of this work is the study of the Malicious PUFs model. To this end, we first formalize the notion of "malicious" PUFs, and extend the UC formulation of Brzuska et al. to allow the adversary to create PUFs with arbitrary adversarial behaviour. Then, we provide positive results in this, more realistic, model. We show that, under computational assumptions, it is possible to UC-securely realize any functionality.
引用
收藏
页码:702 / 718
页数:17
相关论文
共 50 条
  • [41] Universally composable secure TNC model and EAP-TNC protocol in IF-T
    MOON SangJae
    ScienceChina(InformationSciences), 2010, 53 (03) : 465 - 482
  • [42] Universally composable multi-party computation using tamper-proof hardware
    Katz, Jonathan
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2007, 2007, 4515 : 115 - +
  • [43] Universally composable secure TNC model and EAP-TNC protocol in IF-T
    Zhang JunWei
    Ma JianFeng
    Moon SangJae
    SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (03) : 465 - 482
  • [44] Universally composable secure geographic area verification without pre-shared secret
    Junwei Zhang
    Ning Lu
    Jianfeng Ma
    Chao Yang
    Science China Information Sciences, 2019, 62
  • [45] Incoercible Multi-party Computation and Universally Composable Receipt-Free Voting
    Alwen, Joel
    Ostrovsky, Rafail
    Zhou, Hong-Sheng
    Zikas, Vassilis
    ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 : 763 - 780
  • [46] Universally composable secure geographic area verification without pre-shared secret
    Zhang, Junwei
    Lu, Ning
    Ma, Jianfeng
    Yang, Chao
    SCIENCE CHINA-INFORMATION SCIENCES, 2019, 62 (03)
  • [47] Malicious Computation Prevention Protocol for Secure Multi-Party Computation
    Mishra, Durgesh Kumar
    Koria, Neha
    Kapoor, Nikhil
    Bahety, Ravish
    TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 490 - +
  • [48] Secure linear system computation in the presence of malicious adversaries
    ZHANG Bo
    ZHANG FangGuo
    Science China(Information Sciences), 2014, 57 (09) : 146 - 155
  • [49] Secure linear system computation in the presence of malicious adversaries
    Zhang Bo
    Zhang FangGuo
    SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (09) : 1 - 10
  • [50] Two-Output Secure Computation with Malicious Adversaries
    Shelat, Abhi
    Shen, Chih-Hao
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 386 - 405