Physical One-Way Functions
Top Cited Papers
- 20 September 2002
- journal article
- research article
- Published by American Association for the Advancement of Science (AAAS) in Science
- Vol. 297 (5589) , 2026-2030
- https://doi.org/10.1126/science.1074376
Abstract
Modern cryptographic practice rests on the use of one-way functions, which are easy to evaluate but difficult to invert. Unfortunately, commonly used one-way functions are either based on unproven conjectures or have known vulnerabilities. We show that instead of relying on number theory, the mesoscopic physics of coherent transport through a disordered medium can be used to allocate and authenticate unique identifiers by physically reducing the medium's microstructure to a fixed-length string of binary digits. These physical one-way functions are inexpensive to fabricate, prohibitively difficult to duplicate, admit no compact mathematical representation, and are intrinsically tamper-resistant. We provide an authentication protocol based on the enormous address space that is a principal characteristic of physical one-way functions.Keywords
This publication has 21 references indexed in Scilit:
- Experimental comparison of the phase-breaking lengths in weak localization and universal conductance fluctuationsPhysical Review B, 1999
- Multiple scattering of classical waves: microscopy, mesoscopy, and diffusionReviews of Modern Physics, 1999
- Efficient spatial-domain implementation of a multiscale image representation based on Gabor functionsJournal of Electronic Imaging, 1998
- Sensitivity of the multiple-scattering speckle pattern to the motion of a single scattererPhysical Review B, 1991
- Mesoscopic Conductors and Correlations in Laser Speckle PatternsScience, 1991
- Correlations and Fluctuations of Coherent Wave Transmission through Disordered MediaPhysical Review Letters, 1988
- Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-dimensional visual cortical filtersJournal of the Optical Society of America A, 1985
- Holographic reciprocity law failureApplied Optics, 1984
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976