CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
SIAM Journal on Computing
Silicon physical random functions
Proceedings of the 9th ACM conference on Computer and communications security
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
How asymmetry helps load balancing
Journal of the ACM (JACM)
Scalable public-key tracing and revoking
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Balanced Allocations: The Heavily Loaded Case
SIAM Journal on Computing
FPGA Intrinsic PUFs and Their Use for IP Protection
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Modeling attacks on physical unclonable functions
Proceedings of the 17th ACM conference on Computer and communications security
A revocation scheme preserving privacy
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Practical pay-TV scheme using traitor tracing scheme for multiple channels
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Anonymous distribution of encryption keys in cellular broadcast systems
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Privacy in encrypted content distribution using private broadcast encryption
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Hi-index | 0.00 |
We describe a broadcast encryption system with revocation, where security is based on PUF (Physical Unclonable Function) instead of a cryptographic problem. Our scheme is immune to advances of cryptography (which may suddenly ruin any system depending solely of cryptographic assumptions). It is resilient to collusion attacks, which are frequently the Achilles' heel of schemes based on cryptography. It provides a high level of privacy protection of the users. On the downside, it requires memory modules as well as time consuming initialization of PUFs by the broadcaster. Security of the scheme is based on the assumption of randomness of PUF's output and their unclonability.