On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols

被引:14
|
作者
Ruhrmair, Ulrich [1 ]
van Dijk, Marten [2 ]
机构
[1] Tech Univ Munich, Dept Comp Sci, D-80333 Munich, Germany
[2] MIT, Comp Sci & Artificial Intelligence Lab, Cambridge, MA 02139 USA
关键词
Physical unclonable functions (PUFs); Cryptographic protocols; Oblivious transfer; Bit commitment; Security analysis; Interactive hashing;
D O I
10.1007/s13389-013-0052-8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, PUF-based schemes have been suggested not only for the basic tasks of tamper-sensitive key storage or the identification of hardware systems, but also for more complex protocols like oblivious transfer (OT) or bit commitment (BC), both of which possess broad and diverse applications. In this paper, we continue this line of research. We first present an attack on two recent OT and BC protocols which have been introduced by Brzuska et al. (CRYPTO, LNCS 6841, pp 51-70, Springer 2011). The attack quadratically reduces the number of CRPs which malicious players must read out to cheat, and fully operates within the original communication model of Brzuska et al. (CRYPTO, LNCS 6841, pp 51-70, Springer 2011). In practice, this leads to insecure protocols when electrical PUFs with a medium challenge-length are used (e.g., 64 bits), or whenever optical PUFs are employed. These two PUF types are currently among the most popular designs of so-called Strong PUFs. Secondly, we show that the same attack applies to a recent OT protocol of Ostrovsky et al. (IACR Cryptol. ePrint Arch. 2012:143, 2012), leading to exactly the same consequences. Finally, we discuss countermeasures. We present a new OT protocol with better security properties, which utilizes interactive hashing as a substep and is based on an earlier protocol by Ruhrmair (TRUST, LNCS 6101, pp 430-440, Springer 2010). We then closely analyze its properties, including its security, security amplification, and practicality.
引用
收藏
页码:17 / 28
页数:12
相关论文
共 24 条
  • [1] Oblivious Transfer Based on Physical Unclonable Functions
    Ruhrmair, Ulrich
    [J]. TRUST AND TRUSTWORTHY COMPUTING, PROCEEDINGS, 2010, 6101 : 430 - 440
  • [2] Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer
    Song, Yaqi
    Yang, Li
    [J]. APPLIED SCIENCES-BASEL, 2018, 8 (10):
  • [3] Practical oblivious transfer protocols
    Tobias, C
    [J]. INFORMATION HIDING, 2003, 2578 : 415 - 426
  • [4] Quantum Bit Commitment Based on Qubit Oblivious Transfer
    Yang Wei
    Huang Liusheng
    Wang Qiyan
    Luo Yonglong
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2009, 18 (03) : 422 - 426
  • [5] Can relativistic bit commitment lead to secure quantum oblivious transfer?
    He, Guang Ping
    [J]. EUROPEAN PHYSICAL JOURNAL D, 2015, 69 (04):
  • [6] Can relativistic bit commitment lead to secure quantum oblivious transfer?
    Guang Ping He
    [J]. The European Physical Journal D, 2015, 69
  • [7] On the Confidence in Bit-Alias Measurement of Physical Unclonable Functions
    Wilde, Florian
    Pehl, Michael
    [J]. 2019 17TH IEEE INTERNATIONAL NEW CIRCUITS AND SYSTEMS CONFERENCE (NEWCAS), 2019,
  • [8] On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions
    Damgård, I
    Kilian, J
    Salvail, L
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT'99, 1999, 1592 : 56 - 73
  • [9] Efficient Transfer Learning on Modeling Physical Unclonable Functions
    Wang, Qian
    Aramoon, Omid
    Qiu, Pengfei
    Qu, Gang
    [J]. PROCEEDINGS OF THE TWENTYFIRST INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2020), 2020, : 1 - 6
  • [10] Reducing bit flipping problems in SRAM physical unclonable functions for chip identification
    Eiroa, S.
    Castro, J.
    Martinez-Rodriguez, M. C.
    Tena, E.
    Brox, P.
    Baturone, I.
    [J]. 2012 19TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS (ICECS), 2012, : 392 - 395