Universally Composable Multi-party Computation Using Tamper-Proof Hardware

From MaRDI portal
Revision as of 02:46, 9 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5429386

DOI10.1007/978-3-540-72540-4_7zbMath1141.94360OpenAlexW1542455165MaRDI QIDQ5429386

Jonathan N. Katz

Publication date: 29 November 2007

Published in: Advances in Cryptology - EUROCRYPT 2007 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-72540-4_7




Related Items (32)

Secure computation from one-way noisy communication, or: anti-correlation via anti-concentrationPattern matching on encrypted streamsComposable Security in the Tamper-Proof Hardware Model Under Minimal ComplexityConcurrent Secure Computation via Non-Black Box SimulationConcurrent Secure Computation with Optimal Query ComplexityAnother step towards realizing random oracles: non-malleable point obfuscationEverlasting UC commitments from fully malicious PUFsUnclonable polymers and their cryptographic applicationsFeasibility and infeasibility of secure computation with malicious PUFsCompact and Efficient UC Commitments Under Atomic-ExchangesUniversally Composable Firewall Architectures Using Trusted HardwareWeakening the Isolation Assumption of Tamper-Proof Hardware Tokens(Efficient) universally composable oblivious transfer using a minimal number of stateless tokensFully-secure MPC with minimal trustLifting standard model reductions to common setup assumptionsOn concurrent multi-party quantum computationNon-interactive secure computation from one-way functionsSecure Outsourced ComputationConstant Round Adaptively Secure Protocols in the Tamper-Proof Hardware ModelFormal Abstractions for Attested Execution Secure ProcessorsConcurrently Composable Security with Shielded Super-Polynomial SimulatorsUnconditional UC-Secure Computation with (Stronger-Malicious) PUFsOne-Time ProgramsIsolated Proofs of Knowledge and Isolated Zero KnowledgeDavid and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof HardwareSecure Set Intersection with Untrusted Hardware TokensResettably Secure ComputationUC Commitments for Modular Protocol Design and Applications to Revocation and Attribute TokensFounding Cryptography on Tamper-Proof Hardware TokensTruly Efficient String Oblivious Transfer Using Resettable Tamper-Proof TokensUniversally Composable Security Analysis of TLSEquivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model






This page was built for publication: Universally Composable Multi-party Computation Using Tamper-Proof Hardware