Founding Cryptography on Tamper-Proof Hardware Tokens

From MaRDI portal
Revision as of 18:48, 4 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3408202

DOI10.1007/978-3-642-11799-2_19zbMath1274.94072OpenAlexW1501386175MaRDI QIDQ3408202

Yuval Ishai, Vipul Goyal, Amit Sahai, Akshay Wadia, Ramarathnam Venkatesan

Publication date: 24 February 2010

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-11799-2_19




Related Items (31)

Secure computation from one-way noisy communication, or: anti-correlation via anti-concentrationHow to Compute in the Presence of LeakagePattern matching on encrypted streamsComposable Security in the Tamper-Proof Hardware Model Under Minimal ComplexityDelegating RAM Computations with Adaptive Soundness and PrivacyEverlasting UC commitments from fully malicious PUFsUnclonable polymers and their cryptographic applicationsStoring and Retrieving Secrets on a BlockchainWeakening the Isolation Assumption of Tamper-Proof Hardware TokensEncoding Functions with Constant Online Rate, or How to Compress Garbled Circuit Keys(Efficient) universally composable oblivious transfer using a minimal number of stateless tokensOne-time programs from commodity hardwareOn the exact round complexity of best-of-both-worlds multi-party computationNon-interactive secure computation from one-way functionsSecure Outsourced ComputationSecure computation without computersConstant Round Adaptively Secure Protocols in the Tamper-Proof Hardware ModelFormal Abstractions for Attested Execution Secure ProcessorsUnconditional UC-Secure Computation with (Stronger-Malicious) PUFsObfuscating circuits via composite-order graded encodingSecure Set Intersection with Untrusted Hardware TokensOn the power of secure two-party computationTopology-hiding computation for networks with unknown delaysOn the Power of Secure Two-Party ComputationAdaptively Secure Garbled Circuits from One-Way FunctionsConstrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegationTruly Efficient String Oblivious Transfer Using Resettable Tamper-Proof TokensGarbled Circuits as Randomized Encodings of Functions: a PrimerPatchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving SoftwareLattice-Based SNARGs and Their Application to More Efficient ObfuscationSuccinct non-interactive secure computation



Cites Work


This page was built for publication: Founding Cryptography on Tamper-Proof Hardware Tokens