Unclonable polymers and their cryptographic applications
From MaRDI portal
Publication:2170032
DOI10.1007/978-3-031-06944-4_26zbMath1496.94024OpenAlexW4285114165MaRDI QIDQ2170032
Tal Malkin, Anna Roitburd-Berman, Ghada Almashaqbeh, Jonathan Gershoni, Itsik Pe'er, Ran Canetti, Eran Tromer, Yaniv Erlich
Publication date: 30 August 2022
Full work available at URL: https://doi.org/10.1007/978-3-031-06944-4_26
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Overcoming cryptographic impossibility results using blockchains
- Secure software leasing
- UC-secure multiparty computation from one-way functions using stateless tokens
- Basing cryptographic protocols on tamper-evident seals
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Quantum One-Time Programs
- Unconditionally Secure and Universally Composable Commitments from Physical Assumptions
- Physical Zero-Knowledge Proofs of Physical Properties
- One-Time Computable Self-erasing Functions
- Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token
- Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity
- On Symmetric Encryption and Point Obfuscation
- Founding Cryptography on Tamper-Proof Hardware Tokens
- On obfuscating point functions
- On Strong Simulation and Composable Point Obfuscation
- One-Time Programs
- Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
- On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions
- Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing
- Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions
- Universally Composable Security
- Physically Uncloneable Functions in the Universal Composition Framework
- Secure Physical Computation Using Disposable Circuits
- Advances in Cryptology - EUROCRYPT 2004
- Universally Composable Multi-party Computation Using Tamper-Proof Hardware
- Obfuscating Point Functions with Multibit Output
- New Constructions for UC Secure Computation Using Tamper-Proof Hardware
- Reusable garbled circuits and succinct functional encryption
- Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model
- Two-Round Secure MPC from Indistinguishability Obfuscation
- Indistinguishability obfuscation from well-founded assumptions
This page was built for publication: Unclonable polymers and their cryptographic applications