首页> 外文会议>Annual cryptology conference >Feasibility and Infeasibility of Secure Computation with Malicious PUFs
【24h】

Feasibility and Infeasibility of Secure Computation with Malicious PUFs

机译:恶意PUF进行安全计算的可行性和不可行性

获取原文

摘要

A recent line of work has explored the use of physically un-cloneable functions (PUFs) for secure computation, with the goals of (1) achieving universal composability without (additional) setup, and/or (2) obtaining unconditional security (i.e., avoiding complexity-theoretic assumptions). Initial work assumed that all PUFs, even those created by an attacker, are honestly generated. Subsequently, researchers have investigated models in which an adversary can create malicious PUFs with arbitrary behavior. Researchers have considered both malicious PUFs that might be stateful, as well as malicious PUFs that can have arbitrary behavior but are guaranteed to be stateless. We settle the main open questions regarding secure computation in the malicious-PUF model: 1. We prove that unconditionally secure oblivious transfer is impossible, even in the stand-alone setting, if the adversary can construct (malicious) stateful PUFs. 2. We show that universally composable two-party computation is possible if the attacker is limited to creating (malicious) stateless PUFs. Our protocols are simple and efficient, and do not require any cryptographic assumptions.
机译:最近的工作线探索了使用物理上不可克隆的函数(PUF)进行安全计算,其目标是(1)在没有(附加)设置的情况下实现通用的可组合性,和/或(2)获得无条件的安全性(即,避免复杂性理论的假设)。最初的工作假定所有PUF(甚至是由攻击者创建的PUF)都是真实生成的。随后,研究人员研究了攻击者可以创建具有任意行为的恶意PUF的模型。研究人员既考虑了可能具有状态的恶意PUF,也考虑了可以具有任意行为但被保证为无状态的恶意PUF。我们解决了恶意PUF模型中有关安全计算的主要开放性问题:1.我们证明,如果对手可以构造(恶意)有状态PUF,则即使在独立环境中,无条件安全的遗忘转移也是不可能的。 2.我们证明,如果攻击者仅限于创建(恶意)无状态PUF,则通用的可组成两方计算是可能的。我们的协议简单有效,并且不需要任何加密假设。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号