Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity
From MaRDI portal
Publication:3179364
DOI10.1007/978-3-662-53641-4_15zbMATH Open1406.94060OpenAlexW2535311203MaRDI QIDQ3179364FDOQ3179364
Authors: Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam
Publication date: 21 December 2016
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53641-4_15
Recommendations
- Universally Composable Multi-party Computation Using Tamper-Proof Hardware
- Hardware Private Circuits: From Trivial Composition to Full Verification
- New Constructions for UC Secure Computation Using Tamper-Proof Hardware
- Theory of Cryptography
- Unconditional and composable security using a single stateful Tamper-proof hardware token
- A minimal model for secure computation (extended abstract)
- Constant round adaptively secure protocols in the tamper-proof hardware model
- Adaptive hardness and composable security in the plain model from standard assumptions
- Securing circuits and protocols against \(1/\mathrm{poly}(k)\) tampering rate
- An Architecture for Provably Secure Computation
Cites Work
- Bit commitment using pseudorandomness
- Title not available (Why is that?)
- Publicly Verifiable Non-Interactive Zero-Knowledge Proofs
- Founding Cryptography on Oblivious Transfer – Efficiently
- Finding collisions in interactive protocols -- tight lower bounds on the round and communication complexities of statistically hiding commitments
- Advances in Cryptology – CRYPTO 2004
- On the limitations of universally composable two-party computation without set-up assumptions
- Universally composable two-party and multi-party secure computation
- New notions of security: achieving universal composability without trusted setup
- Universally Composable Security with Global Setup
- Title not available (Why is that?)
- Title not available (Why is that?)
- A unified framework for concurrent security
- Founding Cryptography on Tamper-Proof Hardware Tokens
- Advances in Cryptology - CRYPTO 2003
- The Exact Round Complexity of Secure Computation
- Zero-knowledge proofs from secure multiparty computation
- Adaptively secure garbled circuits from one-way functions
- Black-Box Constructions of Two-Party Protocols from One-Way Functions
- Concurrent composition of secure protocols in the timing model
- Universally Composable Multi-party Computation Using Tamper-Proof Hardware
- Improved OR-composition of sigma-protocols
- Adaptive hardness and composable security in the plain model from standard assumptions
- On the Power of Secure Two-Party Computation
- Concurrent non-malleable commitments (and more) in 3 rounds
- Round-optimal black-box two-party computation
- Two-round secure MPC from indistinguishability obfuscation
- Unconditional and composable security using a single stateful Tamper-proof hardware token
- From stateful hardware to resettable hardware using symmetric assumptions
- David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware
- New Constructions for UC Secure Computation Using Tamper-Proof Hardware
- Online/offline OR composition of sigma protocols
- (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens
- A unified framework for UC from only OT
- Adaptive and concurrent secure computation from new adaptive, non-malleable commitments
- General Statistically Secure Computation with Bounded-Resettable Hardware Tokens
- Constant round adaptively secure protocols in the tamper-proof hardware model
- On Black-Box Complexity of Universally Composable Security in the CRS Model
- Implementing resettable UC-functionalities with untrusted tamper-proof hardware-tokens
- Weakening the isolation assumption of tamper-proof hardware tokens
Cited In (18)
- Succinct non-interactive secure computation
- Round-optimal secure multi-party computation
- Unconditional and composable security using a single stateful Tamper-proof hardware token
- Unconditional UC-secure computation with (stronger-malicious) PUFs
- Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
- Everlasting UC commitments from fully malicious PUFs
- UC-secure multiparty computation from one-way functions using stateless tokens
- Constant round adaptively secure protocols in the tamper-proof hardware model
- Adaptive hardness and composable security in the plain model from standard assumptions
- Unclonable polymers and their cryptographic applications
- An Efficient PIR Construction Using Trusted Hardware
- Formal abstractions for attested execution secure processors
- Universally composable secure computation with corrupted tokens
- Fully-secure MPC with minimal trust
- (Efficient) universally composable oblivious transfer using a minimal number of stateless tokens
- Pattern matching on encrypted streams
- Lower Bounds in the Hardware Token Model
- Non-interactive secure computation from one-way functions
This page was built for publication: Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3179364)