搜索结果: 1-10 共查到“军事学 Tamper-Proof Hardware”相关记录10条 . 查询时间(0.125 秒)
Universally Composable Secure Two and Multi-party Computation in the Corruptible Tamper-Proof Hardware Token Model
tamper-proof token corruptible setup assumption
2017/11/13
In this work we introduce the corruptible token model. This model generalizes the stateless tamper-proof token model introduced by Katz (EUROCRYPT '07) and relaxes the trust assumption. Our improved m...
Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model
Secure Computation Tamper-Proof Hardware Adaptive Security
2017/2/20
Achieving constant-round adaptively secure protocols (where all parties can be corrupted) in the plain model is a notoriously hard problem. Very recently, three works published in TCC 2015 (Dachman-So...
Weakening the Isolation Assumption of Tamper-proof Hardware Tokens
Hardware Tokens Isolation Assumption UC security
2016/1/4
Recent results have shown the usefulness of tamper-proof hardware tokens as a setup
assumption for building UC-secure two-party computation protocols, thus providing broad
security guarantees and al...
UC-Secure Multi-Session OT Using Tamper-Proof Hardware
tamper-proof hardware token UC-security multi-session OT
2013/4/18
In this paper, we show the first UC-secure multi-session OT protocol using tamper-proof hardware tokens. The sender and the receiver exchange tokens only at the beginning. Then these tokens are reused...
Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions
Obfuscation Stateless Tamper-Proof hardware Universal Composability
2012/6/14
Code obfuscation is one of the most powerful concepts in cryptography. It could yield functional encryption, digital rights management, and maybe even secure cloud computing. However, general code obf...
Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions
Obfuscation Stateless Tamper-Proof hardware Universal Composability Universal Arguments Fully-Homomorphic-Encryption
2012/3/20
Code obfuscation is one of the most powerful concepts in cryptography. It could yield functional encryption, digital rights management, and maybe even secure cloud computing. However, general code obf...
Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions
Obfuscation Stateless Tamper-Proof hardware
2012/8/28
Code obfuscation is one of the most powerful concepts in cryptography. It could yield functional encryption, digital rights management, and maybe even secure cloud computing. However, general code obf...
Efficient Non-Interactive Oblivious Transfer with Tamper-Proof Hardware
OT Tamper-Proof Hardware Tokens
2010/10/11
In this work, we propose new techniques to achieve truly efficient string OT using tamper-proof hardware tokens. While from one side our tokens need to be stateful, our protocol enjoys several appeali...
David and Goliath Commitments:UC Computation for Asymmetric Parties Using Tamper-Proof Hardware
UC Computation Asymmetric Parties Tamper-Proof Hardware
2009/6/2
Designing secure protocols in the Universal Composability (UC) framework confers many
advantages. In particular, it allows the protocols to be securely used as building blocks in more
complex protoc...
New Constructions for UC Secure Computation using Tamper-proof Hardware
New Constructions UC Secure Computation Tamper-proof Hardware
2008/8/12
The Universal Composability framework was introduced by Canetti to study the security
of protocols which are concurrently executed with other protocols in a network environment.
Unfortunately it was...