Entry Gassend:2008:CPR from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Gassend:2008:CPR,
  author =       "Blaise Gassend and Marten {Van Dijk} and Dwaine Clarke
                 and Emina Torlak and Srinivas Devadas and Pim Tuyls",
  title =        "Controlled physical random functions and
                 applications",
  journal =      j-TISSEC,
  volume =       "10",
  number =       "4",
  pages =        "3:1--3:??",
  month =        jan,
  year =         "2008",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1284680.1284683",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Jun 12 17:52:24 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "The cryptographic protocols that we use in everyday
                 life rely on the secure storage of keys in consumer
                 devices. Protecting these keys from invasive attackers,
                 who open a device to steal its key, is a challenging
                 problem. We propose controlled physical random
                 functions (CPUFs) as an alternative to storing keys and
                 describe the core protocols that are needed to use
                 CPUFs. A physical random functions (PUF) is a physical
                 system with an input and output. The functional
                 relationship between input and output looks like that
                 of a random function. The particular relationship is
                 unique to a specific instance of a PUF, hence, one
                 needs access to a particular PUF instance to evaluate
                 the function it embodies. The cryptographic
                 applications of a PUF are quite limited unless the PUF
                 is combined with an algorithm that limits the ways in
                 which the PUF can be evaluated; this is a CPUF. A major
                 difficulty in using CPUFs is that you can only know a
                 small set of outputs of the PUF---the unknown outputs
                 being unrelated to the known ones. We present protocols
                 that get around this difficulty and allow a chain of
                 trust to be established between the CPUF manufacturer
                 and a party that wishes to interact securely with the
                 PUF device. We also present some elementary
                 applications, such as certified execution.",
  acknowledgement = ack-nhfb,
  articleno =    "3",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "certified execution; physical random function;
                 physical security; physical unclonable function;
                 trusted computing",
}

Related entries