{"title":"PUF Authentication using Visual Secret Sharing Scheme","authors":"D. Naveen, K. Praveen","doi":"10.1109/ICACCS.2019.8728504","DOIUrl":null,"url":null,"abstract":"There are so many modern cryptographic protocols are available which can be used for authenticating wirelessly connected devices. Usually the keys are stored inside the memory of the integrated device which will prompt adversaries to extract secret keys from integrated device. We can persist these attacks by using Physically unclonable functions (PUFs). PUF protocol are designed in such a way that it needs to be light-weight and is resistance against physical attacks. In this paper, we are utilizing the secret sharing method with PUF for an efficient and secure method to authenticate the devices. This new approach is lightweight and suitable for energy constrained platforms such as IOT, smart cards. The proposed protocol does not follow the classic PUF protocol challenge and response pairs, instead of that here a set of shares generated using (2, n) ideal visual secret sharing method are used for authentication","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACCS.2019.8728504","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
There are so many modern cryptographic protocols are available which can be used for authenticating wirelessly connected devices. Usually the keys are stored inside the memory of the integrated device which will prompt adversaries to extract secret keys from integrated device. We can persist these attacks by using Physically unclonable functions (PUFs). PUF protocol are designed in such a way that it needs to be light-weight and is resistance against physical attacks. In this paper, we are utilizing the secret sharing method with PUF for an efficient and secure method to authenticate the devices. This new approach is lightweight and suitable for energy constrained platforms such as IOT, smart cards. The proposed protocol does not follow the classic PUF protocol challenge and response pairs, instead of that here a set of shares generated using (2, n) ideal visual secret sharing method are used for authentication