Reliable Secret Sharing With Physical Random Functions
نویسندگان
چکیده
A Physical Random Function (PUF) is a random function that maps challenges to responses and that can only be evaluated with the help of a complex physical system. It stores key material as a combination of large amounts of hard to measure physical state. If a PUF can only be accessed via an algorithm that is physically linked to the PUF in an inseparable way (i.e., any attempt to circumvent the algorithm will lead to the destruction of the PUF), then it can be used to establish a shared secret key between a remote user and a physical device with the PUF. Once established, the secret key can be used for a wide range of applications including certified execution and software licensing. A practical implementation of a PUF does not immediately lead to a function; the responses are noisy. To make the PUF reliable, together with the challenge, extra redundant information is provided to the PUF. The redundant information is used to correct the noise and generate the shared key. The input to the PUF is transmitted over a public channel, hence, any adversary learns the redundant information and may (in combination with information obtained by experiments with PUFs) distill knowledge about the shared key. To make the PUF securely reliable, we introduce one-pass protocols which can be used for certified execution of a program with encrypted input. We show that the existence of such protocols is equivalent to the existence of fuzzy extractors. We present a practical example based on experiments with chip realizations of silicon PUFs (SPUFs). Finally, we show how responses can be reused in identifying and authenticating SPUFs while staying resistant against replay attacks. This work was funded by Acer Inc., Delta Electronics Inc., HP Corp., NTT Inc., Nokia Research Center, and Philips Research under the MIT Project Oxygen partnership. Visiting researcher from Philips Research, Prof Holstlaan 4, Eindhoven, The Netherlands. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Copyright 2004 ACM X-XXXXX-XX-X/XX/XX ...$5.00.
منابع مشابه
Robust Password-Protected Secret Sharing
Password-protected secret sharing (PPSS) schemes allow a user to publicly share its high-entropy secret across different servers and to later recover it by interacting with some of these servers using only his password without requiring any authenticated data. In particular, this secret will remain safe as long as not too many servers get corrupted. However, servers are not always reliable and ...
متن کاملRandom Matrices Based Image Secret Sharing
This paper presents an image secret sharing method based on some random matrices that acts as a key for secret sharing. The technique allows a secret image to be divided into four image shares with each share individually looks meaningless. To reconstruct the secret image all four shares have to be used. Any subset m (1< m ≤ 4) shares cannot get sufficient information to reveal th e secret imag...
متن کاملAn Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things
Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...
متن کاملA Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions
A non-interactive (t,n)-publicly veriable secret sharing scheme (non-interactive (t,n)-PVSS scheme) is a (t,n)-secret sharing scheme in which anyone, not only the participants of the scheme, can verify the correctness of the produced shares without interacting with the dealer and participants. The (t,n)-PVSS schemes have found a lot of applications in cryptography because they are suitable for<...
متن کاملReusing Shares in Secret Sharing Schemes
A t w threshold scheme is a method for sharing a secret among w shareholders so that the collaboration of at least t shareholders is required in order to reconstruct the shared secret This paper is concerned with the re use of shares possessed by shareholders in threshold schemes We propose a simple t w threshold scheme based on the use of cryptographically strong pseudo random functions and un...
متن کاملA NEW SECRET SHARING SCHEME ADVERSARY FUZZY STRUCTURE BASED ON AUTOMATA
In this paper,we introduce a new verifiable multi-use multi-secretsharing scheme based on automata and one-way hash function. The scheme has theadversary fuzzy structure and satisfy the following properties:1) The dealer can change the participants and the adversary fuzzy structure without refreshing any participants' real-shadow. 2) The scheme is based on the inversion of weakly invertible fin...
متن کامل