Paper Title:
An Authentication Scheme Based on PUF
  Abstract

User authentication is a key research domain in security. A user authentication scheme based on Physical Unclonable Function (PUF) is proposed. Unlike general PUF applications which apply PUF in the tag-end, we employ PUF within an Authentication Centre (AC), which is only used to verify a RFID tag is legal or not. When a tag is legal, the AC will send a password which is used only once to the request reader. The reader can use this password to decrypt the tag’s sensitive information which is encrypted with the same identical password. The later password which is used in encryption is produced and used only once within the tag.

  Info
Periodical
Key Engineering Materials (Volumes 467-469)
Edited by
Dehuai Zeng
Pages
561-566
DOI
10.4028/www.scientific.net/KEM.467-469.561
Citation
Y. M. Xie, "An Authentication Scheme Based on PUF", Key Engineering Materials, Vols. 467-469, pp. 561-566, 2011
Online since
February 2011
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Xin Mei Lu, Lei He
Abstract:It is necessary for researchers to design lightweight authentication protocols to protect information security between tag and reader in RFID...
2709
Authors: Yong Gan, Lei He, Tao Zhang, Na Na Li
Abstract:RFID has become an important infrastructure technology. However, it does not solve information security problem. An adversary can eavesdrop...
2262
Authors: Lei He, Yong Gan, Na Na Li, Tao Zhang
Abstract:Information security problem has become one of the hottest issues in RFID system. More and more researchers begin to study how to provide...
2267
Authors: Wen Lei, Xing Jian Liang, Hong Zhang
Abstract:In practice, the single sign-on system is likely to suffer password attack and replay attack, etc. For the purpose of resolving these...
531
Authors: Chao Jing
Micro-Electronic Packaging Technology and Equipment
Abstract:Increasing number of network applications require authentication of the user's identity which is the first step to ensure security. This...
1791