[go: up one dir, main page]

Komano et al., 2023 - Google Patents

Lightweight Authentication Using Noisy Key Derived from Physically Unclonable

Komano et al., 2023

Document ID
2436051552139778528
Author
Komano Y
Iwamoto M
Ohta K
Sakiyama K
Publication year
Publication venue
Innovative Security Solutions for Information Technology and Communications: 15th International Conference, SecITC 2022, Virtual Event, December 8–9, 2022, Revised Selected Papers

External Links

Snippet

Internet of things (IoT) systems consist of many devices that send their sensor data to cloud servers. Cryptographic authenti-cation is essential for maintaining the consistency of these systems, and lightweight authentication in particular is required because most IoT devices …
Continue reading at books.google.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Similar Documents

Publication Publication Date Title
US9998445B2 (en) Authentication system
Van Herrewege et al. Reverse fuzzy extractors: Enabling lightweight mutual authentication for PUF-enabled RFIDs
Delvaux et al. A survey on lightweight entity authentication with strong PUFs
Barbareschi et al. A PUF-based hardware mutual authentication protocol
Alkeilani Alkadri et al. Deterministic wallets in a quantum world
Kocabaş et al. Converse PUF-based authentication
Cheon et al. Ghostshell: Secure biometric authentication using integrity-based homomorphic evaluations
US20050147243A1 (en) Cryptographic apparatus, cryptographic method, and storage medium thereof
CN119783138B (en) Blockchain-driven distributed privacy data storage and access control method and system
Shang et al. Quantum random oracle model for quantum digital signature
CN118648265A (en) Lattice-based Cryptographic Digital Signature Scheme Using Masking
Jana et al. Differential fault attack on photon-beetle
Zhang et al. Tolerating sensitive-leakage with larger plaintext-space and higher leakage-rate in privacy-aware Internet-of-Things
Jirjees et al. A Secure Password based Authentication with Variable Key Lengths Based on the Image Embedded Method
Umapathy et al. A Key Generation Algorithm for Cryptographic Algorithms to Improve Key Complexity and Efficiency
Komano et al. Lightweight Authentication Using Noisy Key Derived from Physically Unclonable
Cao et al. Fuzzy Identity‐Based Ring Signature from Lattices
Prajwal et al. Quantum-Safe Authentication Protocol leveraging qPUF for Industrial Internet of Things
CN106487495B (en) Lightweight RFID authentication method based on integer chaos
Jiang et al. Lattice-based proxy signature scheme with reject sampling method
Rojas et al. Stochastic selection of responses for physically unclonable functions
Komano et al. Lightweight Authentication Using Noisy Key Derived from Physically Unclonable Function
Wang et al. Efficient Bitcoin Password-protected Wallet Scheme with Key-dependent Message Security.
Woo et al. Robust and Reusable Fuzzy Extractors from Non-Uniform Learning with Errors Problem.
Clark et al. Ultralightweight puf-based authentication protocol: Eliminating rngs and throttling for enhanced security