One-Time Programs

From MaRDI portal
Publication:3600212

DOI10.1007/978-3-540-85174-5_3zbMath1183.68285OpenAlexW1819824216MaRDI QIDQ3600212

Shafi Goldwasser, Guy N. Rothblum, Yael Tauman Kalai

Publication date: 10 February 2009

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-85174-5_3




Related Items (35)

Secure computation from one-way noisy communication, or: anti-correlation via anti-concentrationSuccinct garbling schemes from functional encryption through a local simulation paradigmHow to Compute in the Presence of LeakagePattern matching on encrypted streamsOne-Time Programs with Limited MemoryShort paper: Terrorist fraud in distance bounding: getting around the modelsAdaptive Succinct Garbled RAM or: How to Delegate Your DatabaseAdaptive security of practical garbling schemesUnclonable polymers and their cryptographic applicationsStoring and Retrieving Secrets on a BlockchainUniversally Composable Firewall Architectures Using Trusted HardwareWeakening the Isolation Assumption of Tamper-Proof Hardware TokensReactive Garbling: Foundation, Instantiation, ApplicationEncoding Functions with Constant Online Rate, or How to Compress Garbled Circuit Keys(Efficient) universally composable oblivious transfer using a minimal number of stateless tokensKDM security for the Fujisaki-Okamoto transformations in the QROMLifting standard model reductions to common setup assumptionsOne-time programs from commodity hardwareDisappearing cryptography in the bounded storage modelNon-interactive secure computation from one-way functionsConstant Round Adaptively Secure Protocols in the Tamper-Proof Hardware ModelFormal Abstractions for Attested Execution Secure ProcessorsSecure Set Intersection with Untrusted Hardware TokensCryptography without (Hardly Any) Secrets ?A Leakage-Resilient Mode of OperationOn the power of secure two-party computationIndistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplificationOn the Power of Secure Two-Party ComputationAdaptively Secure Garbled Circuits from One-Way FunctionsFounding Cryptography on Tamper-Proof Hardware TokensTruly Efficient String Oblivious Transfer Using Resettable Tamper-Proof TokensLeakage-Resilient SignaturesPublic-Key Encryption Schemes with Auxiliary InputsGarbled Circuits as Randomized Encodings of Functions: a PrimerPatchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving Software



Cites Work


This page was built for publication: One-Time Programs