Show simple item record

dc.contributor.authorRührmair, Ulrich
dc.contributor.authorvan Dijk, Marten
dc.date.accessioned2016-08-25T18:02:24Z
dc.date.available2016-08-25T18:02:24Z
dc.date.issued2013-03
dc.date.submitted2012-11
dc.identifier.issn2190-8508
dc.identifier.issn2190-8516
dc.identifier.urihttp://hdl.handle.net/1721.1/103985
dc.description.abstractIn recent years, PUF-based schemes have been suggested not only for the basic tasks of tamper-sensitive key storage or the identification of hardware systems, but also for more complex protocols like oblivious transfer (OT) or bit commitment (BC), both of which possess broad and diverse applications. In this paper, we continue this line of research. We first present an attack on two recent OT and BC protocols which have been introduced by Brzuska et al. (CRYPTO, LNCS 6841, pp 51–70, Springer 2011). The attack quadratically reduces the number of CRPs which malicious players must read out to cheat, and fully operates within the original communication model of Brzuska et al. (CRYPTO, LNCS 6841, pp 51–70, Springer 2011). In practice, this leads to insecure protocols when electrical PUFs with a medium challenge-length are used (e.g., 64 bits), or whenever optical PUFs are employed. These two PUF types are currently among the most popular designs of so-called Strong PUFs. Secondly, we show that the same attack applies to a recent OT protocol of Ostrovsky et al. (IACR Cryptol. ePrint Arch. 2012:143, 2012), leading to exactly the same consequences. Finally, we discuss countermeasures. We present a new OT protocol with better security properties, which utilizes interactive hashing as a substep and is based on an earlier protocol by Rührmair (TRUST, LNCS 6101, pp 430–440, Springer 2010). We then closely analyze its properties, including its security, security amplification, and practicality.en_US
dc.publisherSpringer-Verlagen_US
dc.relation.isversionofhttp://dx.doi.org/10.1007/s13389-013-0052-8en_US
dc.rightsArticle is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use.en_US
dc.sourceSpringer-Verlagen_US
dc.titleOn the practical use of physical unclonable functions in oblivious transfer and bit commitment protocolsen_US
dc.typeArticleen_US
dc.identifier.citationRührmair, Ulrich, and Marten van Dijk. “On the Practical Use of Physical Unclonable Functions in Oblivious Transfer and Bit Commitment Protocols.” J Cryptogr Eng 3, no. 1 (March 26, 2013): 17–28.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.mitauthorvan Dijk, Martenen_US
dc.relation.journalJournal of Cryptographic Engineeringen_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/JournalArticleen_US
eprint.statushttp://purl.org/eprint/status/PeerRevieweden_US
dc.date.updated2016-08-18T15:40:04Z
dc.language.rfc3066en
dc.rights.holderSpringer-Verlag Berlin Heidelberg
dspace.orderedauthorsRührmair, Ulrich; van Dijk, Martenen_US
dspace.embargo.termsNen
dc.identifier.orcidhttps://orcid.org/0000-0002-1224-0314
mit.licensePUBLISHER_POLICYen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record