Komano et al., 2023 - Google Patents
Lightweight Authentication Using Noisy Key Derived from Physically UnclonableKomano et al., 2023
- Document ID
- 2436051552139778528
- Author
- Komano Y
- Iwamoto M
- Ohta K
- Sakiyama K
- Publication year
- Publication venue
- Innovative Security Solutions for Information Technology and Communications: 15th International Conference, SecITC 2022, Virtual Event, December 8–9, 2022, Revised Selected Papers
External Links
Snippet
Internet of things (IoT) systems consist of many devices that send their sensor data to cloud servers. Cryptographic authenti-cation is essential for maintaining the consistency of these systems, and lightweight authentication in particular is required because most IoT devices …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9998445B2 (en) | Authentication system | |
| Van Herrewege et al. | Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs | |
| Delvaux et al. | A survey on lightweight entity authentication with strong PUFs | |
| Barbareschi et al. | A PUF-based hardware mutual authentication protocol | |
| Alkeilani Alkadri et al. | Deterministic wallets in a quantum world | |
| Kocabaş et al. | Converse PUF-based authentication | |
| Cheon et al. | Ghostshell: Secure biometric authentication using integrity-based homomorphic evaluations | |
| US20050147243A1 (en) | Cryptographic apparatus, cryptographic method, and storage medium thereof | |
| CN119783138B (en) | Blockchain-driven distributed privacy data storage and access control method and system | |
| Shang et al. | Quantum random oracle model for quantum digital signature | |
| CN118648265A (en) | Lattice-based Cryptographic Digital Signature Scheme Using Masking | |
| Jana et al. | Differential fault attack on photon-beetle | |
| Zhang et al. | Tolerating sensitive-leakage with larger plaintext-space and higher leakage-rate in privacy-aware Internet-of-Things | |
| Jirjees et al. | A Secure Password based Authentication with Variable Key Lengths Based on the Image Embedded Method | |
| Umapathy et al. | A Key Generation Algorithm for Cryptographic Algorithms to Improve Key Complexity and Efficiency | |
| Komano et al. | Lightweight Authentication Using Noisy Key Derived from Physically Unclonable | |
| Cao et al. | Fuzzy Identity‐Based Ring Signature from Lattices | |
| Prajwal et al. | Quantum-Safe Authentication Protocol leveraging qPUF for Industrial Internet of Things | |
| CN106487495B (en) | Lightweight RFID authentication method based on integer chaos | |
| Jiang et al. | Lattice-based proxy signature scheme with reject sampling method | |
| Rojas et al. | Stochastic selection of responses for physically unclonable functions | |
| Komano et al. | Lightweight Authentication Using Noisy Key Derived from Physically Unclonable Function | |
| Wang et al. | Efficient Bitcoin Password-protected Wallet Scheme with Key-dependent Message Security. | |
| Woo et al. | Robust and Reusable Fuzzy Extractors from Non-Uniform Learning with Errors Problem. | |
| Clark et al. | Ultralightweight puf-based authentication protocol: Eliminating rngs and throttling for enhanced security |