2019
DOI: 10.3390/cryptography3030018
|View full text |Cite
|
Sign up to set email alerts
|

Physical Unclonable Function (PUF)-Based e-Cash Transaction Protocol (PUF-Cash)

Abstract: Electronic money (e-money or e-Cash) is the digital representation of physical banknotes augmented by added use cases of online and remote payments. This paper presents a novel, anonymous e-money transaction protocol, built based on physical unclonable functions (PUFs), titled PUF-Cash. PUF-Cash preserves user anonymity while enabling both offline and online transaction capability. The PUF’s privacy-preserving property is leveraged to create blinded tokens for transaction anonymity while its hardware-based cha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 30 publications
(52 reference statements)
0
4
0
Order By: Relevance
“…A few of these architectures are as follows: arbiter PUF [30], ring oscillator PUF [17], transient effect ring oscillator PUF [31], static random access memory PUF [32], hardware-embedded delay PUF [33], and more [34]. Utilizing these basic properties, many PUF-based authentication protocols have been proposed, both for unilateral authentication [35,36] and mutual authentication [29,[36][37][38]. A comprehensive survey on lightweight PUF authentication schemes is presented by Delvaux et al [39].…”
Section: Related Workmentioning
confidence: 99%
“…A few of these architectures are as follows: arbiter PUF [30], ring oscillator PUF [17], transient effect ring oscillator PUF [31], static random access memory PUF [32], hardware-embedded delay PUF [33], and more [34]. Utilizing these basic properties, many PUF-based authentication protocols have been proposed, both for unilateral authentication [35,36] and mutual authentication [29,[36][37][38]. A comprehensive survey on lightweight PUF authentication schemes is presented by Delvaux et al [39].…”
Section: Related Workmentioning
confidence: 99%
“…Several PUF-based authentication protocols have been presented. For instance, a delay PUF was deployed as a key generator in an anonymous e-money transaction protocol [27]. In [28], PUF is proposed for a RFID-authentication protocol.…”
Section: Pufs Use-cases and Their Weaknessesmentioning
confidence: 99%
“…A few of these architectures are: arbiter PUF [30], ring oscillator PUF [17], transient effect ring oscillator PUF [31], static random-access memory PUF [32], hardware embedded delay PUF [33] and more [34]. Utilising these basic properties, many PUF-based authentication protocols have been proposed, both for unilateral authentication [35,36] and mutual authentication [29,[36][37][38]. A comprehensive survey on lightweight PUF authentication schemes is presented by Delvaux et al [39].…”
Section: Related Workmentioning
confidence: 99%