On the practical use of physical unclonable functions in oblivious transfer and bit commitment protocols
In recent years, PUF-based schemes have been suggested not only for the basic tasks of tamper-sensitive key storage or the identification of hardware systems, but also for more complex protocols like oblivious transfer (OT) or bit commitment (BC), both of which possess broad and diverse applications...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
Springer-Verlag,
2016-08-25T18:02:24Z.
|
Subjects: | |
Online Access: | Get fulltext |