Feasibility and infeasibility of secure computation with malicious PUFs
From MaRDI portal
Publication:2175217
DOI10.1007/S00145-019-09329-9zbMath1455.94146OpenAlexW2958290638MaRDI QIDQ2175217
Dominique Schröder, Nils Fleischhacker, Dana Dachman-Soled, Anna Lysyanskaya, Jonathan N. Katz
Publication date: 28 April 2020
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-019-09329-9
Cites Work
- Unnamed Item
- Unnamed Item
- A proof of security of Yao's protocol for two-party computation
- Merkle's key agreement protocol is optimal: an \(O(n^2)\) attack on any key agreement from random oracles
- On the limitations of universally composable two-party computation without set-up assumptions
- Unconditionally Secure and Universally Composable Commitments from Physical Assumptions
- Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography
- Universally Composable Security with Global Setup
- Founding Cryptography on Oblivious Transfer – Efficiently
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Practical Security Analysis of PUF-Based Two-Player Protocols
- Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions
- Physically Uncloneable Functions in the Universal Composition Framework
- Universally Composable Multi-party Computation Using Tamper-Proof Hardware
- Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs
This page was built for publication: Feasibility and infeasibility of secure computation with malicious PUFs