Basing cryptographic protocols on tamper-evident seals
From MaRDI portal
Publication:2268101
DOI10.1016/J.TCS.2009.10.023zbMATH Open1187.68211OpenAlexW1999900367MaRDI QIDQ2268101FDOQ2268101
Publication date: 10 March 2010
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2009.10.023
Recommendations
- Automata, Languages and Programming
- Several weak bit-commitments using seal-once tamper-evident devices
- On key agreement protocols based on tamper-proof hardware
- Founding Cryptography on Tamper-Proof Hardware Tokens
- Cryptography secure against related-key attacks and tampering
- scientific article; zbMATH DE number 1948406
- Tightly secure signatures and public-key encryption
- Tightly Secure Signatures and Public-Key Encryption
Cites Work
- Quantum bit escrow
- Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
- Why quantum bit commitment and ideal quantum coin tossing are impossible.
- An Optimally Fair Coin Toss
- Title not available (Why is that?)
- Synthesizers and their application to the parallel construction of pseudo-random functions
- In code. A mathematical journey.
- Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol
- Public Key Cryptography – PKC 2004
- On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions
- Theory of Cryptography
Cited In (11)
- How to construct physical zero-knowledge proofs for puzzles with a ``single loop condition
- Automata, Languages and Programming
- Another step towards realizing random oracles: non-malleable point obfuscation
- Secure two-party computation: a visual way
- Several weak bit-commitments using seal-once tamper-evident devices
- Founding Cryptography on Tamper-Proof Hardware Tokens
- Unclonable polymers and their cryptographic applications
- Hide a liar: card-based ZKP protocol for Usowan
- Card-minimal protocols for symmetric Boolean functions of more than seven inputs
- New PKI Protocols Using Tamper Resistant Hardware
- Secure computation without computers
This page was built for publication: Basing cryptographic protocols on tamper-evident seals
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2268101)