JP6622795B2 - 動的鍵生成を用いるネットワーク認証システム - Google Patents
動的鍵生成を用いるネットワーク認証システム Download PDFInfo
- Publication number
- JP6622795B2 JP6622795B2 JP2017514397A JP2017514397A JP6622795B2 JP 6622795 B2 JP6622795 B2 JP 6622795B2 JP 2017514397 A JP2017514397 A JP 2017514397A JP 2017514397 A JP2017514397 A JP 2017514397A JP 6622795 B2 JP6622795 B2 JP 6622795B2
- Authority
- JP
- Japan
- Prior art keywords
- communication device
- secure communication
- identification information
- authentication
- information module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000004891 communication Methods 0.000 claims description 48
- 230000002452 interceptive effect Effects 0.000 claims description 10
- 230000010076 replication Effects 0.000 claims description 3
- 230000004044 response Effects 0.000 description 16
- 230000006870 function Effects 0.000 description 9
- 238000000605 extraction Methods 0.000 description 4
- 238000010276 construction Methods 0.000 description 3
- 238000012937 correction Methods 0.000 description 3
- 238000000034 method Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000011156 evaluation Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 239000011248 coating agent Substances 0.000 description 1
- 238000000576 coating method Methods 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 239000011253 protective coating Substances 0.000 description 1
- 230000008929 regeneration Effects 0.000 description 1
- 238000011069 regeneration method Methods 0.000 description 1
- 230000003362 replicative effect Effects 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3278—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
Description
本出願は、2014年5月22日に出願された米国仮特許出願通し番号第62/001,979の優先権の利益を主張し、参照によってそれを組み込む。
・弱いPUFは、典型的には、秘密鍵を導出するためにのみ使用される。チャレンジスペースは、限定され得、レスポンススペースは、決して明らかにされないことが想定される。典型的な構築物は、SRAM型PUF(Holcombら、「Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags」、In Proceedings of the Conference on RFID Security、2007)、バタフライPUF(Kumarら、「Extended abstract:The Butterfly PUF Protecting IP on Every FPGA」、IEEE International Workshop on Hardware−Oriented Security and Trust、第67〜70頁、2008)、アービタPUF(Leeら、「A technique to build a secret key in integrated circuits for identification and authentication applications」、IEEE Symposium on VLSI Circuits:Digest of Technical Papers、第176〜179頁、2004)、リングオシレータPUF(Suhら、「Physical Unclonable Functions for Device Authentication and Secret Key Generation」、Proceedings of the 44th annual Design Automation Conference、DAC’07、第9〜14頁、ACM、2007)、及びコーティングPUF(Tuylsら、「Read−Proof Hardware from Protective Coatings」、Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems、CHES’06、第369〜383頁、Springer、2006)を含む。
・強いPUFは、(i)複製することが物理的に不可能であり、(ii)完全なセットのチャレンジレスポンス対を(典型的には、約1週間と見なされる)適当な時間内に収集することが不可能であり、及び(iii)ランダムなチャレンジに対するレスポンスを予測することが困難であることが想定される。例えば、Ruhrmairによって説明された超高情報量(SHIC)PUF(「Applications of High−Capacity Crossbar Memories in Cryptography」、IEEE Trans.Nanotechnol.、第10巻、第3:489〜498号、2011)は、強いPUFと考えられ得る。
・制御されたPUFは、強いPUFのための基準の全てを満たし、更に、プロトコルを暗号法で増強するためにより高度な機能を計算することが可能な補助制御ユニットを実現する。
1.複製不可能性:Pr[dist(y,x)≦t|x←Uκ1,y←P(x),z←P’]≦ε1、それらの出力分布が統計的にt近似(t−close)であるようにクローンPUF P’でPUF Pを複製する確率は、かなり十分小さなε1よりも少ない。
2.予測不可能性:相手は、(少なくともデバイスに対する物理的アクセスなしで)無視し得る程度を超える確率で、チャレンジcに対するデバイスのPUFレスポンスrを予測することができないことと、ヘルパーデータが、PUFレスポンスについて相手に何も明らかにしないことと、が望ましい。全ての実体が、確率的多項式時間(PPT)に結び付けられること、すなわち、(関連したパラメータにおけるビットの数のことを言う)グローバル安全性パラメータλに関して多くの多項式演算を要求する計算、
PUF−PRED:PUF予測ゲーム
1.相手Aは、PUFデバイスPに対して(安全性パラメータλに関して)多項式の多くのチャレンジ
2.PUFデバイスPは、レスポンス{ri|ri←P(ci)}をAに戻す。
3.相手Aは、最終的に、チャレンジクエリ
4.相手Aは、多項式の多くのチャレンジ
5.PUFデバイスPは、レスポンス
6.相手Aは、最終的に、コミットされたチャレンジcに対するPのレスポンスについての推測r’を出力する。
相手は、推測r’が、Aのコミットされたチャレンジcに対するPの実際のレスポンスr←P(c)に等しいときにのみゲームに勝つ。(留意したように、PUFの出力には、雑音があり、その出力は、固定入力上でわずかに変動し、それゆえ、同等物が、典型的には、ファジー抽出器の出力に関して取られる(例えば、Dodisら、「Fuzzy Extractors:How to Generate Strong Keys from Biometrics and Other Noisy Data」、SIAM J.Comput.、第38巻、第1:97−139号、2008))。
3.頑強性:Pr[dist(y,z)>t|x←Uκ1,y←P(x),z←P(x)]≦ε2、すなわち、固定PUF Pが、同じ入力xについてt遠隔(t−distant)レスポンスをもたらす確率は、かなり十分小さなε2よりも少ない。
4.区別不可能性:PUFデバイスの出力(典型的にはファジー抽出器の出力)は、好適には、PPT相手Aのアドバンテージ
PUF−IND:PUF区別不可能性ゲーム
1.相手Aは、任意のチャレンジ
2.PUFデバイスは、Genの出力からの対応するヘルパーストリングHiを戻す。チャレンジ−ヘルパー対(ci,Hi)のこのセットをCHとして示す。
3.次に、相手Aは、任意のci∈CHのためのPUFレスポンスri=P(ci)を要求する。このステップにおいて要求されたチャレンジのセットを
4.全ての要求
5.相手Aは、AがcについてHiを有するがRiを有さないように、チャレンジ
6.b=0である場合、Aは、Ri=Rep(P(c)=ri,Hi)で与えられる。そうではなくて、b=1である場合には、Aは、ランダムなストリング
7.相手Aは、
8.全ての要求
9.相手は、推測(guess)ビットb’を出力し、b’=bのときに成功する。
PUFの関連する評価は、Horiら、「Quantitative and Statistical Performance Evaluation of Arbiter Physical Unclonable Functions on FPGAs」、2010 International Conference on Reconfigurable Computing and FPGAs(ReCon−Fig)、第298〜303頁、2010、Maiti、A Systematic Approach to Design an Efficient Physical Unclonable Function、論文、Virginia Tech、2012、及び他のものによって提供される。
Claims (15)
- セキュア通信デバイスであって、
a.通信入力及び通信出力と、
b.前記デバイスに特有のハードウェア固有識別情報を有するハードウェア識別情報モジュールと、
c.前記通信入力及び通信出力に、かつ前記ハードウェア識別情報モジュールに接続された論理プロセッサと、を備え、
前記セキュア通信デバイスが、前記セキュア通信デバイスの公開鍵に対して検証可能である及び前記セキュア通信デバイスの前記ハードウェア固有識別情報に基づくゼロ知識証明認証トークンを含む認証更新パケットを前記通信出力上で所望の受信デバイスに送信することによって、非対話型認証を行うように構成され、前記セキュア通信デバイスが、暗号化されたセッション鍵を生成して前記認証更新パケットに含むように更に構成される、
セキュア通信デバイス。 - 前記セキュア通信デバイスが、前記所望の受信デバイスの非対称暗号化及び公開鍵を使用して前記認証更新パケットに含まれる前記セッション鍵を暗号化するように更に構成される、請求項1に記載のセキュア通信デバイス。
- 前記セキュア通信デバイスが、前記セッション鍵上で前記セキュア通信デバイスの暗号化された署名を前記認証更新パケットに含むように更に構成される、請求項1に記載のセキュア通信デバイス。
- 前記セキュア通信デバイスが、前記セッション鍵上で前記セキュア通信デバイスの暗号化された署名を前記認証更新パケットに含むように更に構成される、請求項2に記載のセキュア通信デバイス。
- 前記認証トークンが、タイムスタンプに基づく、請求項1、2、3、または4のいずれか一項に記載のセキュア通信デバイス。
- 前記セキュア通信デバイスが、前記セキュア通信デバイスの前記ハードウェア固有識別情報に基づく認証トークンを含み、かつ新たなセッション鍵を含む認証更新パケットを送信するように構成される、請求項1、2、3、または4のいずれか一項に記載のセキュア通信デバイス。
- 前記セキュア通信デバイスが、数学的エンジンを更に備える、請求項1、2、3、または4のいずれか一項に記載のセキュア通信デバイス。
- 前記セキュア通信デバイスが、楕円曲線暗号法を行うように構成され、前記数学的エンジンが、楕円曲線計算を行うように構成される、請求項7に記載のセキュア通信デバイス。
- 前記セキュア通信デバイスが、更新された公開鍵を含む認証更新パケットを送信するように更に構成される、請求項1、2、3、または4のいずれか一項に記載のセキュア通信デバイス。
- 前記ハードウェア識別情報モジュールが、物理複製不可能関数である、請求項1、2、3、または4のいずれか一項に記載のセキュア通信デバイス。
- 前記ハードウェア識別情報モジュールが、物理複製不可能関数である、請求項5に記載のセキュア通信デバイス。
- 前記ハードウェア識別情報モジュールが、物理複製不可能関数である、請求項6に記載のセキュア通信デバイス。
- 前記ハードウェア識別情報モジュールが、物理複製不可能関数である、請求項7に記載のセキュア通信デバイス。
- 前記ハードウェア識別情報モジュールが、物理複製不可能関数である、請求項8に記載のセキュア通信デバイス。
- 前記ハードウェア識別情報モジュールが、物理複製不可能関数である、請求項9に記載のセキュア通信デバイス。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201462001979P | 2014-05-22 | 2014-05-22 | |
US62/001,979 | 2014-05-22 | ||
PCT/US2015/032320 WO2015179849A2 (en) | 2014-05-22 | 2015-05-22 | Network authentication system with dynamic key generation |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2017517229A JP2017517229A (ja) | 2017-06-22 |
JP6622795B2 true JP6622795B2 (ja) | 2019-12-18 |
Family
ID=54554985
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2017514397A Active JP6622795B2 (ja) | 2014-05-22 | 2015-05-22 | 動的鍵生成を用いるネットワーク認証システム |
Country Status (5)
Country | Link |
---|---|
US (1) | US10382962B2 (ja) |
EP (1) | EP3146670B8 (ja) |
JP (1) | JP6622795B2 (ja) |
CN (1) | CN106797313B (ja) |
WO (1) | WO2015179849A2 (ja) |
Families Citing this family (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8887309B2 (en) * | 2005-08-23 | 2014-11-11 | Intrinsic Id B.V. | Method and apparatus for information carrier authentication |
US20150134966A1 (en) | 2013-11-10 | 2015-05-14 | Sypris Electronics, Llc | Authentication System |
US9946858B2 (en) | 2014-05-05 | 2018-04-17 | Analog Devices, Inc. | Authentication system and device including physical unclonable function and threshold cryptography |
US9672342B2 (en) | 2014-05-05 | 2017-06-06 | Analog Devices, Inc. | System and device binding metadata with hardware intrinsic properties |
US10432409B2 (en) | 2014-05-05 | 2019-10-01 | Analog Devices, Inc. | Authentication system and device including physical unclonable function and threshold cryptography |
US10547460B2 (en) * | 2016-11-18 | 2020-01-28 | Qualcomm Incorporated | Message-based key generation using physical unclonable function (PUF) |
US11310062B2 (en) * | 2017-03-31 | 2022-04-19 | Arizona Board Of Regents On Behalf Of Northern Arizona University | Securing physically unclonable functions with additional random ternary states |
CN108733311B (zh) * | 2017-04-17 | 2021-09-10 | 伊姆西Ip控股有限责任公司 | 用于管理存储系统的方法和设备 |
US10425235B2 (en) | 2017-06-02 | 2019-09-24 | Analog Devices, Inc. | Device and system with global tamper resistance |
US10958452B2 (en) | 2017-06-06 | 2021-03-23 | Analog Devices, Inc. | System and device including reconfigurable physical unclonable functions and threshold cryptography |
WO2019101325A1 (en) * | 2017-11-23 | 2019-05-31 | Huawei Technologies Co., Ltd. | Device, system and method for secure data communication |
US11050574B2 (en) * | 2017-11-29 | 2021-06-29 | Taiwan Semiconductor Manufacturing Company, Ltd. | Authentication based on physically unclonable functions |
EP3769467B1 (en) * | 2018-03-23 | 2024-02-28 | nChain Licensing AG | Computer-implemented system and method for exchange of data |
WO2020006178A1 (en) * | 2018-06-27 | 2020-01-02 | Stc. Unm | Correlation-based robust authentication technique using helper data only |
CN109104410B (zh) * | 2018-07-12 | 2021-01-01 | 湖北工业大学 | 一种信息的匹配方法及装置 |
US11379263B2 (en) * | 2018-08-13 | 2022-07-05 | Ares Technologies, Inc. | Systems, devices, and methods for selecting a distributed framework |
US11316692B2 (en) * | 2018-08-13 | 2022-04-26 | Ares Technologies, Inc. | Systems, devices, and methods for selecting a distributed framework |
US11271759B2 (en) * | 2018-09-05 | 2022-03-08 | Arizona Board Of Regents On Behalf Of Northern Arizona University | Secure digital signatures using physical unclonable function devices with reduced error rates |
US10999082B2 (en) | 2018-09-28 | 2021-05-04 | Analog Devices, Inc. | Localized garbled circuit device |
AT522608A1 (de) * | 2019-05-16 | 2020-12-15 | Evva Sicherheitstechnologie | Verfahren zum Betreiben eines Zutrittskontrollsystems sowie Zutrittskontrollsystem |
CN110120874B (zh) * | 2019-05-28 | 2021-04-20 | 湖南大学 | 基于物理不可克隆函数的轻量级密钥共享方法 |
CN110519052B (zh) * | 2019-08-23 | 2022-07-05 | 青岛海尔科技有限公司 | 基于物联网操作系统的数据交互方法和装置 |
CN111224783B (zh) * | 2019-11-26 | 2021-07-23 | 复旦大学 | 一种支持密钥刷新的两方椭圆曲线数字签名方法 |
CN113765856B (zh) * | 2020-06-04 | 2023-09-08 | 中移(成都)信息通信科技有限公司 | 身份认证方法、装置、设备和介质 |
US11804971B2 (en) | 2020-08-05 | 2023-10-31 | Analog Devices, Inc. | Correcting physical unclonable function errors based on short integers solutions to lattice problems |
Family Cites Families (58)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2948294B2 (ja) * | 1990-09-20 | 1999-09-13 | 松下電器産業株式会社 | 認証機能付き鍵配送システムにおける端末 |
US20030004817A1 (en) * | 2001-06-27 | 2003-01-02 | Conoco Inc | Visual database for linking geography to seismic data |
EP1293874A3 (en) * | 2001-09-06 | 2006-08-02 | Nippon Telegraph and Telephone Corporation | Authentication method, authentication system, and authentication token |
US8346951B2 (en) | 2002-03-05 | 2013-01-01 | Blackridge Technology Holdings, Inc. | Method for first packet authentication |
US7245718B2 (en) | 2003-08-26 | 2007-07-17 | Mitsubishi Electric Research Laboratories, Inc. | Low bandwidth zero knowledge authentication protocol and device |
US20050222896A1 (en) | 2003-09-19 | 2005-10-06 | Rhyne Joseph C | Systems, methods, and software for leveraging informational assets across multiple business units |
EP1683297A1 (en) | 2003-10-29 | 2006-07-26 | Koninklijke Philips Electronics N.V. | System and method of reliable forward secret key sharing with physical random functions |
US20050149496A1 (en) | 2003-12-22 | 2005-07-07 | Verity, Inc. | System and method for dynamic context-sensitive federated search of multiple information repositories |
US7549048B2 (en) * | 2004-03-19 | 2009-06-16 | Microsoft Corporation | Efficient and secure authentication of computing systems |
US7581248B2 (en) | 2004-06-28 | 2009-08-25 | International Business Machines Corporation | Federated identity brokering |
US7564345B2 (en) | 2004-11-12 | 2009-07-21 | Verayo, Inc. | Volatile device keys and applications thereof |
US20070036353A1 (en) * | 2005-05-31 | 2007-02-15 | Interdigital Technology Corporation | Authentication and encryption methods using shared secret randomness in a joint channel |
CN101213786A (zh) | 2005-07-07 | 2008-07-02 | 皇家飞利浦电子股份有限公司 | 检验对象真伪的方法、设备和系统 |
WO2007031908A2 (en) | 2005-09-14 | 2007-03-22 | Koninklijke Philips Electronics N.V. | Improved device, system and method for determining authenticity of an item |
EP1958373B1 (en) | 2005-11-29 | 2009-03-25 | Koninklijke Philips Electronics N.V. | Physical secret sharing and proofs of vicinity using pufs |
EP2030364B1 (en) * | 2006-05-21 | 2015-08-12 | International Business Machines Corporation | Assertion message signatures |
US7926089B2 (en) | 2006-07-14 | 2011-04-12 | Hewlett-Packard Development Company, L.P. | Router for managing trust relationships |
US8787566B2 (en) | 2006-08-23 | 2014-07-22 | Red Hat, Inc. | Strong encryption |
JP4345794B2 (ja) * | 2006-09-28 | 2009-10-14 | ソニー株式会社 | 固体撮像素子の製造方法 |
EP2081170A1 (en) | 2006-11-06 | 2009-07-22 | Panasonic Corporation | Information security apparatus |
US20080256549A1 (en) | 2007-04-10 | 2008-10-16 | International Business Machines Corporation | System and Method of Planning for Cooperative Information Processing |
US8463813B2 (en) | 2007-04-12 | 2013-06-11 | Younite, Inc. | Individualized data sharing |
US8290150B2 (en) | 2007-05-11 | 2012-10-16 | Validity Sensors, Inc. | Method and system for electronically securing an electronic device using physically unclonable functions |
US20110215829A1 (en) | 2007-08-22 | 2011-09-08 | Intrinsic Id B.V. | Identification of devices using physically unclonable functions |
US20090063860A1 (en) * | 2007-08-31 | 2009-03-05 | Albert Tyler Barnett | Printer driver that encrypts print data |
US8782396B2 (en) * | 2007-09-19 | 2014-07-15 | Verayo, Inc. | Authentication with physical unclonable functions |
US7962516B2 (en) | 2008-02-05 | 2011-06-14 | International Business Machines Corporation | System and method for adding multi-level security to federated asset repositories |
KR20090104421A (ko) * | 2008-03-31 | 2009-10-06 | 고려대학교 산학협력단 | 무선센서네트워크에서의 타원곡선암호 기반 키 설정 방법과이를 이용한 무선센서네트워크 시스템 및 기록매체 |
JP2011526113A (ja) | 2008-06-27 | 2011-09-29 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | アイテムの真正性、完全性、及び/又は物理的状態を検証するための装置、システム、及び方法 |
TWI498827B (zh) | 2008-11-21 | 2015-09-01 | Verayo Inc | 非連網射頻辨識裝置物理不可複製功能之鑑認技術 |
JP5101535B2 (ja) * | 2009-01-19 | 2012-12-19 | 日本電信電話株式会社 | 認証方法、認証システム、プログラムおよび共有鍵生成方法 |
WO2010100015A1 (en) | 2009-03-06 | 2010-09-10 | Intrinsic Id B.V. | System for establishing a cryptographic key depending on a physical system |
US8555069B2 (en) * | 2009-03-06 | 2013-10-08 | Microsoft Corporation | Fast-reconnection of negotiable authentication network clients |
EP2230794A3 (en) | 2009-03-16 | 2011-10-05 | Technische Universität München | Towards Electrical, Integrated Implementations of SIMPL Systems |
US8379856B2 (en) | 2009-06-17 | 2013-02-19 | Empire Technology Development Llc | Hardware based cryptography |
US8468186B2 (en) | 2009-08-05 | 2013-06-18 | Verayo, Inc. | Combination of values from a pseudo-random source |
US8811615B2 (en) | 2009-08-05 | 2014-08-19 | Verayo, Inc. | Index-based coding with a pseudo-random source |
KR101452713B1 (ko) * | 2009-10-30 | 2014-10-21 | 삼성전자주식회사 | 픽처 경계의 부호화 단위를 부호화, 복호화 하는 방법 및 장치 |
EP2526505B1 (en) * | 2010-01-20 | 2015-06-17 | Intrinsic ID B.V. | Device and method for obtaining a cryptographic key |
US8281127B2 (en) | 2010-02-01 | 2012-10-02 | Blackridge Technology Holdings, Inc. | Method for digital identity authentication |
US20120072717A1 (en) | 2010-02-01 | 2012-03-22 | Hayes John W | Dynamic identity authentication system |
US8458489B2 (en) | 2010-03-25 | 2013-06-04 | Empire Technology Development Llc | Differential uncloneable variability-based cryptography |
US20110299678A1 (en) | 2010-06-07 | 2011-12-08 | Alexander Roger Deas | Secure means for generating a specific key from unrelated parameters |
US8516269B1 (en) | 2010-07-28 | 2013-08-20 | Sandia Corporation | Hardware device to physical structure binding and authentication |
US8848905B1 (en) | 2010-07-28 | 2014-09-30 | Sandia Corporation | Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting |
US8667265B1 (en) * | 2010-07-28 | 2014-03-04 | Sandia Corporation | Hardware device binding and mutual authentication |
US20120137137A1 (en) | 2010-11-30 | 2012-05-31 | Brickell Ernest F | Method and apparatus for key provisioning of hardware devices |
US8418006B1 (en) | 2010-12-07 | 2013-04-09 | Xilinx, Inc. | Protecting a design for an integrated circuit using a unique identifier |
US8386990B1 (en) | 2010-12-07 | 2013-02-26 | Xilinx, Inc. | Unique identifier derived from an intrinsic characteristic of an integrated circuit |
US20120183135A1 (en) | 2011-01-19 | 2012-07-19 | Verayo, Inc. | Reliable puf value generation by pattern matching |
US8566579B2 (en) | 2011-03-15 | 2013-10-22 | Sandia Corporation | Obfuscated authentication systems, devices, and methods |
US8643244B2 (en) * | 2011-07-25 | 2014-02-04 | Hamilton Sundstrand Corporation | Strength cast rotor for an induction motor |
US9547761B2 (en) * | 2012-04-09 | 2017-01-17 | Mcafee, Inc. | Wireless token device |
US8525169B1 (en) | 2012-08-10 | 2013-09-03 | International Business Machines Corporation | Reliable physical unclonable function for device authentication |
US20150008240A1 (en) * | 2013-07-08 | 2015-01-08 | Douglas Mark Davis | Refillable Lotion Back Applicator |
US9489501B2 (en) * | 2013-09-19 | 2016-11-08 | Fujitsu Limited | Authentication method, authentication device, and system |
US20150134966A1 (en) | 2013-11-10 | 2015-05-14 | Sypris Electronics, Llc | Authentication System |
US9628272B2 (en) | 2014-01-03 | 2017-04-18 | William Marsh Rice University | PUF authentication and key-exchange by substring matching |
-
2015
- 2015-05-22 JP JP2017514397A patent/JP6622795B2/ja active Active
- 2015-05-22 CN CN201580027307.3A patent/CN106797313B/zh active Active
- 2015-05-22 WO PCT/US2015/032320 patent/WO2015179849A2/en active Application Filing
- 2015-05-22 US US14/720,636 patent/US10382962B2/en active Active
- 2015-05-22 EP EP15795660.8A patent/EP3146670B8/en active Active
Also Published As
Publication number | Publication date |
---|---|
US10382962B2 (en) | 2019-08-13 |
EP3146670A2 (en) | 2017-03-29 |
EP3146670B1 (en) | 2021-08-18 |
CN106797313A (zh) | 2017-05-31 |
WO2015179849A2 (en) | 2015-11-26 |
EP3146670A4 (en) | 2018-01-17 |
JP2017517229A (ja) | 2017-06-22 |
WO2015179849A3 (en) | 2016-01-14 |
EP3146670B8 (en) | 2021-09-22 |
US20150341792A1 (en) | 2015-11-26 |
CN106797313B (zh) | 2020-09-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6622795B2 (ja) | 動的鍵生成を用いるネットワーク認証システム | |
US11652627B2 (en) | Systems and methods for distributed key storage | |
US10931467B2 (en) | Authentication system and device including physical unclonable function and threshold cryptography | |
US9998445B2 (en) | Authentication system | |
Zhang et al. | A privacy-aware PUFs-based multiserver authentication protocol in cloud-edge IoT systems using blockchain | |
US8762723B2 (en) | Cryptographic security using fuzzy credentials for device and server communications | |
US8589693B2 (en) | Method for two step digital signature | |
CN106576046B (zh) | 将元数据与硬件固有属性绑定的系统和设备 | |
CN107615285A (zh) | 包括物理不可克隆功能和阈值加密的认证系统和装置 | |
CN110959163A (zh) | 能够在多个存储节点上安全存储大型区块链的计算机实现的系统和方法 | |
WO2019110399A1 (en) | Two-party signature device and method | |
Yang et al. | A novel authenticated key agreement protocol with dynamic credential for WSNs | |
De Smet et al. | Lightweight PUF based authentication scheme for fog architecture | |
Braeken | PUF‐Based Authentication and Key Exchange for Internet of Things | |
KR20070035342A (ko) | 패스워드 기반의 경량화된 상호 인증 방법 | |
CN115336224A (zh) | 自适应抗攻击分布式对称加密 | |
CN114696997B (zh) | 一种基于ca和国密算法的抗量子计算通信方法及系统 | |
Wallrabenstein | Implementing authentication systems based on physical unclonable functions | |
JP5392741B2 (ja) | Rsaをベースとしたパスワード認証方式及びその応用 | |
Román et al. | Post-quantum Secure Communication with IoT Devices Using Kyber and SRAM Behavioral and Physical Unclonable Functions | |
CN116192404A (zh) | 一种融合身份认证的加密传输方法、系统、设备及存储介质 | |
CN114584321A (zh) | 一种基于puf器件的数据信息加密部署方法 | |
CN117643010A (zh) | 无证书认证和安全通信 | |
KR20210003608A (ko) | 물리적 복제방지 기능 기반 인증 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20170124 |
|
A711 | Notification of change in applicant |
Free format text: JAPANESE INTERMEDIATE CODE: A711 Effective date: 20170314 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A821 Effective date: 20170314 |
|
RD03 | Notification of appointment of power of attorney |
Free format text: JAPANESE INTERMEDIATE CODE: A7423 Effective date: 20170726 |
|
RD04 | Notification of resignation of power of attorney |
Free format text: JAPANESE INTERMEDIATE CODE: A7424 Effective date: 20170728 |
|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20180518 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20190228 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20190318 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20190612 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20191028 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20191122 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 6622795 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |