PUF-derived IoT identities in a zero-knowledge protocol for blockchain
暂无分享,去创建一个
Gero Dittmann | Iluminada Baturone | Andreas Kind | Jens Jelitto | Miguel A. Prada-Delgado | A. Kind | J. Jelitto | I. Baturone | G. Dittmann
[1] R. Grubbs,et al. Synthesis of isocyanate-based brush block copolymers and their rapid self-assembly to infrared-reflecting photonic crystals. , 2012, Journal of the American Chemical Society.
[2] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[3] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[4] Maximilian Hofer,et al. Physical Unclonable Functions in Theory and Practice , 2012 .
[5] Marko Vukolic,et al. Hyperledger fabric: a distributed operating system for permissioned blockchains , 2018, EuroSys.
[6] Stephen A. Benton,et al. Physical one-way functions , 2001 .
[7] Iluminada Baturone,et al. Physical unclonable keys for smart lock systems using Bluetooth Low Energy , 2016, IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society.
[8] Dawu Gu,et al. On the Robustness of Learning Parity with Noise , 2016, ICICS.
[9] Tim Güneysu,et al. Securing Systems With Indispensable Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the Internet of Things , 2017, IEEE Access.
[10] Srinivas Devadas,et al. FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise , 2017, Cryptogr..
[11] Srinivas Devadas,et al. Silicon physical random functions , 2002, CCS '02.
[12] Krzysztof Pietrzak,et al. Cryptography from Learning Parity with Noise , 2012, SOFSEM.
[13] Iluminada Baturone,et al. A PUF- and Biometric-Based Lightweight Hardware Solution to Increase Security at Sensor Nodes , 2018, Sensors.
[14] Srinivas Devadas,et al. Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions , 2017, IEEE Transactions on Dependable and Secure Computing.
[15] Ujjwal Guin,et al. Invasion of the hardware snatchers , 2017, IEEE Spectrum.
[16] John Kelsey,et al. Recommendation for Random Number Generation Using Deterministic Random Bit Generators , 2014 .
[17] Roel Maes,et al. Physically Unclonable Functions , 2012, Springer Berlin Heidelberg.
[18] Lidong Chen,et al. Recommendation for Key Derivation Using Pseudorandom Functions (Revised) , 2009 .
[19] Stephan Krenn,et al. Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise , 2012, ASIACRYPT.
[20] Ingrid Verbauwhede,et al. Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs , 2009, CHES.
[21] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[22] Bharadwaj Veeravalli,et al. Blockchain-based decentralized content trust for docker images , 2017, Multimedia Tools and Applications.
[23] Iluminada Baturone,et al. Improved Generation of Identifiers, Secret Keys, and Random Numbers From SRAMs , 2015, IEEE Transactions on Information Forensics and Security.
[24] Damien Sauveron,et al. Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[25] Emmanuel Delamarche,et al. High-Content Optical Codes for Protecting Rapid Diagnostic Tests from Counterfeiting. , 2018, Analytical chemistry.
[26] Jinjun Chen,et al. Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions , 2019, Future Gener. Comput. Syst..
[27] Elaine B. Barker,et al. Recommendation for Cryptographic Key Generation , 2012 .
[28] Nir Kshetri,et al. 1 Blockchain's roles in meeting key supply chain management objectives , 2018, Int. J. Inf. Manag..