Sciweavers

ISW
2009
Springer

Robust Authentication Using Physically Unclonable Functions

14 years 5 months ago
Robust Authentication Using Physically Unclonable Functions
Abstract. In this work we utilize a physically unclonable function (PUF) to improve resilience of authentication protocols to various types of compromise. As an example application, we consider users who authenticate at an ATM using their bank-issued PUF and a password. We present a scheme that is provably secure and achieves strong security properties. In particular, we ensure that (i) the user is unable to authenticate without her device; (ii) the device cannot be used by someone else to successfully authenticate as the user; (iii) the device cannot be duplicated (e.g., by a bank employee); (iv) an adversary with full access to the bank’s personal and authentication records is unable to impersonate the user even if he obtains access to the device before and/or after the setup; (v) the device does not need to store any information. We also give an extension that endows the solution with emergency capabilities: if a user is coerced into opening her secrets and giving the coercer full...
Keith B. Frikken, Marina Blanton, Mikhail J. Atall
Added 26 May 2010
Updated 26 May 2010
Type Conference
Year 2009
Where ISW
Authors Keith B. Frikken, Marina Blanton, Mikhail J. Atallah
Comments (0)