On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols

In recent years, PUF-based schemes have been suggested not only for the basic tasks of tamper-sensitive key storage or the identification of hardware systems, but also for more complex protocols like oblivious transfer (OT) or bit commitment (BC), both of which possess broad and diverse applications...

Full description

Bibliographic Details
Main Authors: Rührmair, Ulrich, van Dijk, Marten
Other Authors: Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
Format: Article
Language:English
Published: Springer-Verlag 2016
Online Access:http://hdl.handle.net/1721.1/103985
https://orcid.org/0000-0002-1224-0314
_version_ 1826206431398854656
author Rührmair, Ulrich
van Dijk, Marten
author2 Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
author_facet Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
Rührmair, Ulrich
van Dijk, Marten
author_sort Rührmair, Ulrich
collection MIT
description In recent years, PUF-based schemes have been suggested not only for the basic tasks of tamper-sensitive key storage or the identification of hardware systems, but also for more complex protocols like oblivious transfer (OT) or bit commitment (BC), both of which possess broad and diverse applications. In this paper, we continue this line of research. We first present an attack on two recent OT and BC protocols which have been introduced by Brzuska et al. (CRYPTO, LNCS 6841, pp 51–70, Springer 2011). The attack quadratically reduces the number of CRPs which malicious players must read out to cheat, and fully operates within the original communication model of Brzuska et al. (CRYPTO, LNCS 6841, pp 51–70, Springer 2011). In practice, this leads to insecure protocols when electrical PUFs with a medium challenge-length are used (e.g., 64 bits), or whenever optical PUFs are employed. These two PUF types are currently among the most popular designs of so-called Strong PUFs. Secondly, we show that the same attack applies to a recent OT protocol of Ostrovsky et al. (IACR Cryptol. ePrint Arch. 2012:143, 2012), leading to exactly the same consequences. Finally, we discuss countermeasures. We present a new OT protocol with better security properties, which utilizes interactive hashing as a substep and is based on an earlier protocol by Rührmair (TRUST, LNCS 6101, pp 430–440, Springer 2010). We then closely analyze its properties, including its security, security amplification, and practicality.
first_indexed 2024-09-23T13:29:44Z
format Article
id mit-1721.1/103985
institution Massachusetts Institute of Technology
language English
last_indexed 2024-09-23T13:29:44Z
publishDate 2016
publisher Springer-Verlag
record_format dspace
spelling mit-1721.1/1039852022-09-28T14:35:34Z On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols Rührmair, Ulrich van Dijk, Marten Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory van Dijk, Marten In recent years, PUF-based schemes have been suggested not only for the basic tasks of tamper-sensitive key storage or the identification of hardware systems, but also for more complex protocols like oblivious transfer (OT) or bit commitment (BC), both of which possess broad and diverse applications. In this paper, we continue this line of research. We first present an attack on two recent OT and BC protocols which have been introduced by Brzuska et al. (CRYPTO, LNCS 6841, pp 51–70, Springer 2011). The attack quadratically reduces the number of CRPs which malicious players must read out to cheat, and fully operates within the original communication model of Brzuska et al. (CRYPTO, LNCS 6841, pp 51–70, Springer 2011). In practice, this leads to insecure protocols when electrical PUFs with a medium challenge-length are used (e.g., 64 bits), or whenever optical PUFs are employed. These two PUF types are currently among the most popular designs of so-called Strong PUFs. Secondly, we show that the same attack applies to a recent OT protocol of Ostrovsky et al. (IACR Cryptol. ePrint Arch. 2012:143, 2012), leading to exactly the same consequences. Finally, we discuss countermeasures. We present a new OT protocol with better security properties, which utilizes interactive hashing as a substep and is based on an earlier protocol by Rührmair (TRUST, LNCS 6101, pp 430–440, Springer 2010). We then closely analyze its properties, including its security, security amplification, and practicality. 2016-08-25T18:02:24Z 2016-08-25T18:02:24Z 2013-03 2012-11 2016-08-18T15:40:04Z Article http://purl.org/eprint/type/JournalArticle 2190-8508 2190-8516 http://hdl.handle.net/1721.1/103985 Rührmair, Ulrich, and Marten van Dijk. “On the Practical Use of Physical Unclonable Functions in Oblivious Transfer and Bit Commitment Protocols.” J Cryptogr Eng 3, no. 1 (March 26, 2013): 17–28. https://orcid.org/0000-0002-1224-0314 en http://dx.doi.org/10.1007/s13389-013-0052-8 Journal of Cryptographic Engineering Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. Springer-Verlag Berlin Heidelberg application/pdf Springer-Verlag Springer-Verlag
spellingShingle Rührmair, Ulrich
van Dijk, Marten
On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols
title On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols
title_full On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols
title_fullStr On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols
title_full_unstemmed On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols
title_short On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols
title_sort on the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols
url http://hdl.handle.net/1721.1/103985
https://orcid.org/0000-0002-1224-0314
work_keys_str_mv AT ruhrmairulrich onthepracticaluseofphysicalunclonablefunctionsinoblivioustransferandbitcommitmentprotocols
AT vandijkmarten onthepracticaluseofphysicalunclonablefunctionsinoblivioustransferandbitcommitmentprotocols