General Statistically Secure Computation with Bounded-Resettable Hardware Tokens
From MaRDI portal
Publication:5261634
Recommendations
- Resettably Secure Computation
- Universally composable secure computation with corrupted tokens
- Almost-Everywhere Secure Computation
- Resettable statistical zero knowledge
- Lower Bounds in the Hardware Token Model
- Efficient perfectly secure computation with optimal resilience
- Efficient perfectly secure computation with optimal resilience
- Secure computation using leaky tokens
- Statistical security in two-party computation revisited
Cited in
(12)- Secure computation using leaky tokens
- Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity
- Universally composable secure computation with corrupted tokens
- Unconditional UC-secure computation with (stronger-malicious) PUFs
- Lower Bounds in the Hardware Token Model
- Implementing resettable UC-functionalities with untrusted tamper-proof hardware-tokens
- Interactive locking, zero-knowledge PCPs, and unconditional cryptography
- Everlasting UC commitments from fully malicious PUFs
- (Efficient) universally composable oblivious transfer using a minimal number of stateless tokens
- Constant round adaptively secure protocols in the tamper-proof hardware model
- From stateful hardware to resettable hardware using symmetric assumptions
- Truly efficient string oblivious transfer using resettable tamper-proof tokens
This page was built for publication: General Statistically Secure Computation with Bounded-Resettable Hardware Tokens
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5261634)