Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens
From MaRDI portal
Publication:2947531
DOI10.1007/978-3-319-17470-9_12zbMath1375.94121arXiv1502.03487OpenAlexW2129163995MaRDI QIDQ2947531
Tobias Nilges, Rafael Dowsley, Jörn Müller-Quade
Publication date: 24 September 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1502.03487
Related Items (2)
Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity ⋮ Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model
Cites Work
- Unnamed Item
- Unnamed Item
- Unconditionally Secure and Universally Composable Commitments from Physical Assumptions
- Feasibility and Infeasibility of Secure Computation with Malicious PUFs
- Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token
- Program Obfuscation with Leaky Hardware
- Founding Cryptography on Tamper-Proof Hardware Tokens
- Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens
- Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography
- One-Time Programs
- A Framework for Efficient and Composable Oblivious Transfer
- Universally Composable Multiparty Computation with Partially Isolated Parties
- Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens
- Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions
- Secure Computation Using Leaky Tokens
- Physically Uncloneable Functions in the Universal Composition Framework
- Advances in Cryptology - CRYPTO 2003
- Universally Composable Multi-party Computation Using Tamper-Proof Hardware
- David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware
- New Constructions for UC Secure Computation Using Tamper-Proof Hardware
- (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens
- Lower Bounds in the Hardware Token Model
- Theory of Cryptography
This page was built for publication: Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens