Feasibility and Infeasibility of Secure Computation with Malicious PUFs

Journal article


Publication Details

Author(s): Dachman-Soled D, Fleischhacker N, Katz J, Lysyanskaya A, Schröder D
Journal: Journal of Cryptology
Publication year: 2019
ISSN: 0933-2790


Abstract

A recent line of work has explored the use of physically unclonable functions (PUFs) for secure computation, with the goals of (1) achieving universal composability without additional setup and/or (2) obtaining unconditional security (i.e., avoiding complexity-theoretic assumptions). Initial work assumed that all PUFs, even those created by an attacker, are honestly generated. Subsequently, researchers have investigated models in which an adversary can create malicious PUFs with arbitrary behavior. Researchers have considered both malicious PUFs that might be stateful, as well as malicious PUFs that can have arbitrary behavior but are guaranteed to be stateless. We settle the main open questions regarding secure computation in the malicious-PUF model:We prove that unconditionally secure oblivious transfer is impossible, even in the stand-alone setting, if the adversary can construct (malicious) stateful PUFs.We show that if the attacker is limited to creating (malicious) stateless PUFs, then universally composable two-party computation is possible, unconditionally.


FAU Authors / FAU Editors

Schröder, Dominique Prof. Dr.
Lehrstuhl für Informatik 13 (Angewandte Kryptographie)


External institutions with authors

Brown University
Ruhr-Universität Bochum (RUB)
University of Maryland


How to cite

APA:
Dachman-Soled, D., Fleischhacker, N., Katz, J., Lysyanskaya, A., & Schröder, D. (2019). Feasibility and Infeasibility of Secure Computation with Malicious PUFs. Journal of Cryptology. https://dx.doi.org/10.1007/s00145-019-09329-9

MLA:
Dachman-Soled, Dana, et al. "Feasibility and Infeasibility of Secure Computation with Malicious PUFs." Journal of Cryptology (2019).

BibTeX: 

Last updated on 2019-24-07 at 12:08