2019
DOI: 10.1049/iet-sen.2018.5291
|View full text |Cite
|
Sign up to set email alerts
|

Optical PUFs as physical root of trust for blockchain‐driven applications

Abstract: In an environment where cyber attacks are increasing, both in frequency and complexity, novel ways to shield data, users, and procedures have to be envisioned. Physical unclonable functions (PUFs) are the physical equivalent of one-way mathematical transformations with the exception that their inherent physical complexity renders them resilient to cloning. One interesting deployment scenario includes PUFs as random key generators. The deterministic nature of their operation alleviates the necessity to store th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 35 publications
0
5
0
Order By: Relevance
“…Fuzzy extractors are employed in authentication protocols that verify that only the authentic device is able to recover the cryptographic key from the obfuscated stored data. In this way, in [ 27 , 28 ], the authentication procedure of an IoT device was based on checking if the cryptographic key is correctly recovered by the PUF. In [ 27 ], optical PUFs were employed in private blockchains.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Fuzzy extractors are employed in authentication protocols that verify that only the authentic device is able to recover the cryptographic key from the obfuscated stored data. In this way, in [ 27 , 28 ], the authentication procedure of an IoT device was based on checking if the cryptographic key is correctly recovered by the PUF. In [ 27 ], optical PUFs were employed in private blockchains.…”
Section: Related Workmentioning
confidence: 99%
“…In this way, in [ 27 , 28 ], the authentication procedure of an IoT device was based on checking if the cryptographic key is correctly recovered by the PUF. In [ 27 ], optical PUFs were employed in private blockchains. In [ 28 ], SRAM PUFs inside microcontroller-based devices were employed in zero-knowledge protocols.…”
Section: Related Workmentioning
confidence: 99%
“…a surface of few mm 2 ). The first such implementation at a preproduction level was reported in [42], [43] and was tested successfully for a period of six months continuously in the framework of the EU R&D project SMILE [44]. Fig.…”
Section: Dimitris Syvridismentioning
confidence: 99%
“…They propose the integration of IoT with blockchain that uses a physical address inside a semiconductor chip mounted into an IIoT device. Furthermore, the authors in [49] present a new dimension to PUFs and introduce optical PUFs as a physical trust root for blockchain-based applications. They stress that optical PUFs (o-PUFs) can be successfully used as random number generators to generate bit strings.…”
Section: Physical Layermentioning
confidence: 99%