General Statistically Secure Computation with Bounded-Resettable Hardware Tokens
From MaRDI portal
Publication:5261634
DOI10.1007/978-3-662-46494-6_14zbMATH Open1354.94027OpenAlexW2186869461MaRDI QIDQ5261634FDOQ5261634
Authors: Nico Döttling, Daniel Kraschewski, Joern Mueller-Quade, Tobias Nilges
Publication date: 6 July 2015
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46494-6_14
Recommendations
- Resettably Secure Computation
- Universally composable secure computation with corrupted tokens
- Almost-Everywhere Secure Computation
- Resettable statistical zero knowledge
- Lower Bounds in the Hardware Token Model
- Efficient perfectly secure computation with optimal resilience
- Efficient perfectly secure computation with optimal resilience
- Secure computation using leaky tokens
- Statistical security in two-party computation revisited
Cryptography (94A60) Complexity classes (hierarchies, relations among complexity classes, etc.) (68Q15)
Cited In (12)
- Secure computation using leaky tokens
- Interactive locking, zero-knowledge PCPs, and unconditional cryptography
- Truly efficient string oblivious transfer using resettable tamper-proof tokens
- From stateful hardware to resettable hardware using symmetric assumptions
- Unconditional UC-secure computation with (stronger-malicious) PUFs
- Everlasting UC commitments from fully malicious PUFs
- Constant round adaptively secure protocols in the tamper-proof hardware model
- Universally composable secure computation with corrupted tokens
- Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity
- Implementing resettable UC-functionalities with untrusted tamper-proof hardware-tokens
- (Efficient) universally composable oblivious transfer using a minimal number of stateless tokens
- Lower Bounds in the Hardware Token Model
This page was built for publication: General Statistically Secure Computation with Bounded-Resettable Hardware Tokens
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5261634)