Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens
From MaRDI portal
Publication:4910303
DOI10.1007/978-3-642-36594-2_36zbMath1315.94069OpenAlexW124860231MaRDI QIDQ4910303
Tobias Nilges, Nico Döttling, Jörn Müller-Quade, Thilo Mie
Publication date: 18 March 2013
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-36594-2_36
Related Items (6)
Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity ⋮ Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens ⋮ (Efficient) universally composable oblivious transfer using a minimal number of stateless tokens ⋮ The pseudorandom oracle model and ideal obfuscation ⋮ Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model ⋮ Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs
This page was built for publication: Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens