TY - GEN
T1 - Virtual proofs of reality and their physical implementation
AU - Ruhrmair, Ulrich
AU - Martinez-Hurtado, J. L.
AU - Xu, Xiaolin
AU - Kraeh, Christian
AU - Hilgers, Christian
AU - Kononchuk, Dima
AU - Finley, Jonathan J.
AU - Burleson, Wayne P.
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/7/17
Y1 - 2015/7/17
N2 - We discuss the question of how physical statements can be proven over digital communication channels between two parties (a 'prover' and a 'verifier') residing in two separate local systems. Examples include: (i) 'a certain object in the prover's system has temperature X°C', (ii) 'two certain objects in the prover's system are positioned at distance X', or (iii) 'a certain object in the prover's system has been irreversibly altered or destroyed'. As illustrated by these examples, our treatment goes beyond classical security sensors in considering more general physical statements. Another distinctive aspect is the underlying security model: We neither assume secret keys in the prover's system, nor do we suppose classical sensor hardware in his system which is tamper-resistant and trusted by the verifier. Without an established name, we call this new type of security protocol a 'virtual proof of reality' or simply a 'virtual proof' (VP). In order to illustrate our novel concept, we give example VPs based on temperature sensitive integrated circuits, disordered optical scattering media, and quantum systems. The corresponding protocols prove the temperature, relative position, or destruction/modification of certain physical objects in the prover's system to the verifier. These objects (so-called 'witness objects') are prepared by the verifier and handed over to the prover prior to the VP. Furthermore, we verify the practical validity of our method for all our optical and circuit-based VPs in detailed proof-of-concept experiments. Our work touches upon, and partly extends, several established concepts in cryptography and security, including physical unclonable functions, quantum cryptography, interactive proof systems, and, most recently, physical zero-knowledge proofs. We also discuss potential advancements of our method, for example 'public virtual proofs' that function without exchanging witness objects between the verifier and the prover.
AB - We discuss the question of how physical statements can be proven over digital communication channels between two parties (a 'prover' and a 'verifier') residing in two separate local systems. Examples include: (i) 'a certain object in the prover's system has temperature X°C', (ii) 'two certain objects in the prover's system are positioned at distance X', or (iii) 'a certain object in the prover's system has been irreversibly altered or destroyed'. As illustrated by these examples, our treatment goes beyond classical security sensors in considering more general physical statements. Another distinctive aspect is the underlying security model: We neither assume secret keys in the prover's system, nor do we suppose classical sensor hardware in his system which is tamper-resistant and trusted by the verifier. Without an established name, we call this new type of security protocol a 'virtual proof of reality' or simply a 'virtual proof' (VP). In order to illustrate our novel concept, we give example VPs based on temperature sensitive integrated circuits, disordered optical scattering media, and quantum systems. The corresponding protocols prove the temperature, relative position, or destruction/modification of certain physical objects in the prover's system to the verifier. These objects (so-called 'witness objects') are prepared by the verifier and handed over to the prover prior to the VP. Furthermore, we verify the practical validity of our method for all our optical and circuit-based VPs in detailed proof-of-concept experiments. Our work touches upon, and partly extends, several established concepts in cryptography and security, including physical unclonable functions, quantum cryptography, interactive proof systems, and, most recently, physical zero-knowledge proofs. We also discuss potential advancements of our method, for example 'public virtual proofs' that function without exchanging witness objects between the verifier and the prover.
KW - Interactive Proof Systems
KW - Keyless Security Sensors
KW - Physical Cryptography
KW - Physical Unclonable Functions (PUFs)
KW - Physical Zero-Knowledge Proofs
KW - Quantum Cryptography
KW - Virtual Proofs (VPs) of Reality
UR - http://www.scopus.com/inward/record.url?scp=84945183189&partnerID=8YFLogxK
U2 - 10.1109/SP.2015.12
DO - 10.1109/SP.2015.12
M3 - Conference contribution
AN - SCOPUS:84945183189
T3 - Proceedings - IEEE Symposium on Security and Privacy
SP - 70
EP - 85
BT - Proceedings - 2015 IEEE Symposium on Security and Privacy, SP 2015
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 36th IEEE Symposium on Security and Privacy, SP 2015
Y2 - 18 May 2015 through 20 May 2015
ER -