Unconditional and composable security using a single stateful Tamper-proof hardware token
From MaRDI portal
Publication:3000538
DOI10.1007/978-3-642-19571-6_11zbMATH Open1295.94055OpenAlexW1552897331MaRDI QIDQ3000538FDOQ3000538
Authors: Nico Döttling, Daniel Kraschewski, Joern Mueller-Quade
Publication date: 19 May 2011
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19571-6_11
Recommendations
- Founding Cryptography on Tamper-Proof Hardware Tokens
- Reusing tamper-proof hardware in UC-secure protocols
- Weakening the isolation assumption of tamper-proof hardware tokens
- New Constructions for UC Secure Computation Using Tamper-Proof Hardware
- Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity
Universal ComposabilityInformation-Theoretical SecuritySecure Two-Party ComputationTamper-Proof Hardware
Cited In (17)
- Weakening the isolation assumption of tamper-proof hardware tokens
- BiTR: built-in tamper resilience
- Composable long-term security with rewinding
- Reusing tamper-proof hardware in UC-secure protocols
- Quadratic multiparty randomized encodings beyond honest majority and their applications
- A new security proof of practical cryptographic devices based on hardware, software and protocols
- Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle Model
- Everlasting UC commitments from fully malicious PUFs
- Constant round adaptively secure protocols in the tamper-proof hardware model
- Founding Cryptography on Tamper-Proof Hardware Tokens
- Two-round oblivious linear evaluation from learning with errors
- Unclonable polymers and their cryptographic applications
- Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity
- (Efficient) universally composable oblivious transfer using a minimal number of stateless tokens
- Somewhere statistically binding commitment schemes with applications
- Pattern matching on encrypted streams
- Non-interactive secure computation from one-way functions
This page was built for publication: Unconditional and composable security using a single stateful Tamper-proof hardware token
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3000538)