{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T18:40:09Z","timestamp":1748803209389,"version":"3.41.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319308395"},{"type":"electronic","value":"9783319308401"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-30840-1_23","type":"book-chapter","created":{"date-parts":[[2016,3,9]],"date-time":"2016-03-09T14:15:22Z","timestamp":1457532922000},"page":"359-372","source":"Crossref","is-referenced-by-count":1,"title":["Anonymous Authentication Scheme Based on PUF"],"prefix":"10.1007","author":[{"given":"\u0141ukasz","family":"Krzywiecki","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,10]]},"reference":[{"issue":"2","key":"23_CR1","first-page":"4","volume":"2","author":"Y Lindell","year":"2010","unstructured":"Lindell, Y.: Anonymous authentication. J. Priv. Confidentiality 2(2), 4 (2010)","journal-title":"J. Priv. Confidentiality"},{"key":"23_CR2","doi-asserted-by":"publisher","first-page":"2026","DOI":"10.1126\/science.1074376","volume":"297","author":"RS Pappu","year":"2002","unstructured":"Pappu, R.S., Recht, B., Taylor, J., Gershenfeld, N.: Physical one-way functions. Science 297, 2026\u20132030 (2002). http:\/\/web.media.mit.edu\/\u00a0brecht\/papers\/02.PapEA.powf.pdf","journal-title":"Science"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D.E., van Dijk, M., Devadas, S.: Silicon physical random functions. In Atluri, V., ed.: ACM Conference on Computer and Communications Security, pp. 148\u2013160. ACM (2002)","DOI":"10.1145\/586110.586132"},{"key":"23_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-74735-2_5","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"J Guajardo","year":"2007","unstructured":"Guajardo, J., Kumar, S.S., Schrijen, G.-J., Tuyls, P.: FPGA intrinsic PUFs and their use for IP protection. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 63\u201380. Springer, Heidelberg (2007)"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Gassend, B., Clarke, D., van Dijk, M., Devadas, S.: Controlled physical random functions. In: Proceedings of the 18th Annual Computer Security Applications Conference (2002)","DOI":"10.1145\/586110.586132"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Gassend, B.: Physical Random Functions. Master\u2019s thesis, MIT, USA (2003)","DOI":"10.1145\/586110.586132"},{"key":"23_CR7","unstructured":"Pappu, R.S.: Physical one-way functions. Ph.D thesis, Massachusetts Institute of Technology (2001). http:\/\/pubs.media.mit.edu\/pubs\/papers\/01.03.pappuphd.powf.pdf"},{"key":"23_CR8","unstructured":"Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Design Automation Conference, pp. 9\u201314. ACM Press, New York (2007). http:\/\/people.csail.mit.edu\/devadas\/pubs\/puf-dac07.pdf"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Majzoobi, M., Koushanfar, F., Potkonjak, M.: Lightweight secure pufs. In: ICCAD 2008: Proceedings of the 2008 IEEE\/ACM International Conference on Computer-Aided Design, Piscataway, NJ, USA, pp. 670\u2013673. IEEE Press (2008)","DOI":"10.1109\/ICCAD.2008.4681648"},{"issue":"11","key":"23_CR10","doi-asserted-by":"publisher","first-page":"1077","DOI":"10.1002\/cpe.805","volume":"16","author":"B Gassend","year":"2004","unstructured":"Gassend, B., Lim, D., Clarke, D., Devadas, S., van Dijk, M.: Identification and authentication of integrated circuits. Concurrency Comput.: Pract. Experience 16(11), 1077\u20131098 (2004)","journal-title":"Concurrency Comput.: Pract. Experience"},{"key":"23_CR11","unstructured":"Lee, J.W., Lim, D., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: A technique to build a secret key in integrated circuits for identification and authentication applications. In: VLSI Circuits, pp. 176\u2013179. Digest of Technical Papers (2004)"},{"issue":"10","key":"23_CR12","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TVLSI.2005.859470","volume":"13","author":"D Lim","year":"2005","unstructured":"Lim, D., Lee, J.W., Gassend, B., Suh, G.E., van Dijk, M., Devadas, S.: Extracting secret keys from integrated circuits. IEEE Trans. Very Large Scale Integr. (VLSI) Syst, 13(10), 1200\u20131205 (2005)","journal-title":"IEEE Trans. Very Large Scale Integr. (VLSI) Syst,"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Nithyanand, R., Solis, J.: A theoretical analysis: physical unclonable functions and the software protection problem. In: 2012 IEEE Symposium on Security and Privacy Workshops, San Francisco, CA, USA, pp. 1\u201311. IEEE Computer Society, 24\u201325 May 2012 (2012). http:\/\/dx.doi.org\/10.1109\/SPW.2012.16","DOI":"10.1109\/SPW.2012.16"},{"issue":"8","key":"23_CR14","doi-asserted-by":"crossref","first-page":"1126","DOI":"10.1109\/JPROC.2014.2320516","volume":"102","author":"Charles Herder","year":"2014","unstructured":"Herder, C., Yu, M.M., Koushanfar, F., Devadas, S.: Physical unclonable functions and applications: a tutorial. In: Proceedings of the IEEE vol. 102(8), pp. 1126\u20131141 (2014). http:\/\/dx.doi.org\/10.1109\/JPROC.2014.2320516","journal-title":"Proceedings of the IEEE"},{"key":"23_CR15","unstructured":"Suh, G.E., Devadas, S.: Physical unclonable functions for device authentication and secret key generation. In: Proceedings of the 44th Design Automation Conference, DAC 2007, San Diego, CA, USA, pp. 9\u201314. IEEE, 4\u20138 June 2007 (2007). http:\/\/doi.acm.org\/10.1145\/1278480.1278484"},{"key":"23_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-642-21599-5_4","volume-title":"Trust and Trustworthy Computing","author":"\u0141 Krzywiecki","year":"2011","unstructured":"Krzywiecki, \u0141., Kuty\u0142owski, M.: Coalition resistant anonymous broadcast encryption scheme based on PUF. In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol. 6740, pp. 48\u201362. Springer, Heidelberg (2011). http:\/\/dx.doi.org\/10.1007\/978-3-642-21599-5_4"},{"key":"23_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-642-22792-9_4","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"C Brzuska","year":"2011","unstructured":"Brzuska, C., Fischlin, M., Schr\u00f6der, H., Katzenbeisser, S.: Physically uncloneable functions in the universal composition framework. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 51\u201370. Springer, Heidelberg (2011). http:\/\/dx.doi.org\/10.1007\/978-3-642-22792-9_4"},{"key":"23_CR18","unstructured":"Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science. FOCS 2001, p. 136. Computer Society (2001). http:\/\/dl.acm.org\/citation.cfm?id=874063.875553"},{"key":"23_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1007\/978-3-642-38348-9_41","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013","author":"R Ostrovsky","year":"2013","unstructured":"Ostrovsky, R., Scafuro, A., Visconti, I., Wadia, A.: Universally composable secure computation with (malicious) physically uncloneable functions. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 702\u2013718. Springer, Heidelberg (2013). http:\/\/dx.doi.org\/10.1007\/978-3-642-38348-9_41"},{"key":"23_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-642-25283-9_8","volume-title":"Trusted Systems","author":"J Walker","year":"2011","unstructured":"Walker, J., Li, J.: Key exchange with anonymous authentication using DAA-SIGMA protocol. In: Chen, L., Yung, M. (eds.) INTRUST 2010. LNCS, vol. 6802, pp. 108\u2013127. Springer, Heidelberg (2011). http:\/\/dx.doi.org\/10.1007\/978-3-642-25283-9_8"},{"issue":"3","key":"23_CR21","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1093\/comjnl\/bxh149","volume":"49","author":"G Hanaoka","year":"2006","unstructured":"Hanaoka, G., Shikata, J., Hanaoka, Y., Imai, H.: Unconditionally secure anonymous encryption and group authentication. Comput. J. 49(3), 310\u2013321 (2006). http:\/\/dx.doi.org\/10.1093\/comjnl\/bxh149","journal-title":"Comput. J."},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Lee, Y., Han, S., Lee, S., Chung, B., Lee, D.: Anonymous authentication system using group signature. In: Barolli, L., Xhafa, F., Hsu, H., eds.: 2009 International Conference on Complex, Intelligent and Software Intensive Systems, CISIS 2009, Fukuoka, Japan, pp. 1235\u20131239. IEEE Computer Society, 16\u201319 March 2009 (2009). http:\/\/dx.doi.org\/10.1109\/CISIS.2009.196","DOI":"10.1109\/CISIS.2009.196"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Xu, Z., Tian, H., Liu, D., Lin, J.: A ring-signature anonymous authentication method based on one-way accumulator. In: 2010 Second International Conference on Communication Systems, Networks and Applications (ICCSNA), vol. 2, pp. 56\u201359 (2010)","DOI":"10.1109\/ICCSNA.2010.5588939"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC 2015"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-30840-1_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T18:13:01Z","timestamp":1748801581000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-30840-1_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319308395","9783319308401"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-30840-1_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}