While a host of variants seems conceivable, this paper focuses on VPs in which the verifier has handed over one or more specific physical objects O_i to the prover at some point prior to the VP. These “witness objects” assist the prover during the proof, but shall not contain classical digital keys nor be assumed tamper-resistant in the classical sense. The prover is allowed to open, inspect and alter these objects in our adversarial model, only being limited by current technology, while he shall still be unable to prove false claims to the verifier.
In order to illustrate our concept, we give example protocols built on temperature sensitive integrated circuits, disordered optical scattering media, and quantum systems. These protocols prove the temperature, destruction/modification, or relative position of witness objects in the prover’s location. Full experimental realizations of these schemes are beyond the scope of this paper. But the protocols utilize established technologies from the areas of physical unclonable functions and quantum cryptography, and hence appear plausible also without such proof. Finally, we also discuss potential advancements of our method in theory, for example “public virtual proofs” that function without exchanging witness objects Oi between the verifier and the prover.
Our work touches upon and partly extends several established cryptographic and security concepts, including physical unclonable functions, quantum cryptography, and interactive proof systems.Category / Keywords: foundations / Physical Unclonable Functions (PUFs), Interactive Proofs, Quantum Cryptography, Physical Cryptography Date: received 2 Jun 2014, last revised 2 Jun 2014 Contact author: ruehrmair at ilo de Available format(s): PDF | BibTeX Citation Note: For completeness, we would like to mention a few earlier versions of this work in patent writings and talks: In 2009/2010, the general concept of Virtual Proofs of Reality (VPs), as well as concrete VPs of temperature and destruction, have been described in patent writings by the author and colleagues (please see http://www.google.com/patents/WO2010105994A2?cl=en and reference ). Furthermore, VPs have been described in public talks by the author at SOFSEM 2011 (please see http://kedrigern.dcs.fmph.uniba.sk/kralovic/sofsem2011/index.php?param=204 and reference ) and at the RISC seminar at CWI in 2012 (please see http://projects.cwi.nl/crypto/risc2012.html and reference ). Version: 20140605:203609 (All versions of this report) Short URL: ia.cr/2014/415 Discussion forum: Show discussion | Start new discussion