New Constructions for UC Secure Computation Using Tamper-Proof Hardware
From MaRDI portal
Publication:5458613
DOI10.1007/978-3-540-78967-3_31zbMATH Open1149.68376OpenAlexW1563623221MaRDI QIDQ5458613FDOQ5458613
Authors: Nishanth Chandran, Vipul Goyal, Amit Sahai
Publication date: 15 April 2008
Published in: Advances in Cryptology – EUROCRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-78967-3_31
Recommendations
- Universally Composable Multi-party Computation Using Tamper-Proof Hardware
- Reusing tamper-proof hardware in UC-secure protocols
- From stateful hardware to resettable hardware using symmetric assumptions
- David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware
- Universally composable secure computation with corrupted tokens
Cited In (33)
- David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware
- Universally Composable Multiparty Computation with Partially Isolated Parties
- Secure computation using leaky tokens
- Weakening the isolation assumption of tamper-proof hardware tokens
- BiTR: built-in tamper resilience
- Reusing tamper-proof hardware in UC-secure protocols
- Resettably Secure Computation
- Truly efficient string oblivious transfer using resettable tamper-proof tokens
- Secure physical computation using disposable circuits
- Unconditional and composable security using a single stateful Tamper-proof hardware token
- From stateful hardware to resettable hardware using symmetric assumptions
- Secure outsourced computation
- Unconditional UC-secure computation with (stronger-malicious) PUFs
- Universally Composable Multi-party Computation Using Tamper-Proof Hardware
- Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches
- Everlasting UC commitments from fully malicious PUFs
- UC-secure multiparty computation from one-way functions using stateless tokens
- Constant round adaptively secure protocols in the tamper-proof hardware model
- Founding Cryptography on Tamper-Proof Hardware Tokens
- Unclonable polymers and their cryptographic applications
- Topology-hiding computation for networks with unknown delays
- An Efficient PIR Construction Using Trusted Hardware
- Formal abstractions for attested execution secure processors
- Compact and efficient UC commitments under atomic-exchanges
- Universally composable secure computation with corrupted tokens
- Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity
- Fully-secure MPC with minimal trust
- Secure set intersection with untrusted hardware tokens
- Implementing resettable UC-functionalities with untrusted tamper-proof hardware-tokens
- (Efficient) universally composable oblivious transfer using a minimal number of stateless tokens
- Pattern matching on encrypted streams
- New PKI Protocols Using Tamper Resistant Hardware
- Non-interactive secure computation from one-way functions
This page was built for publication: New Constructions for UC Secure Computation Using Tamper-Proof Hardware
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458613)