David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware
From MaRDI portal
Publication:5458612
DOI10.1007/978-3-540-78967-3_30zbMath1149.94325OpenAlexW1492842426MaRDI QIDQ5458612
Publication date: 15 April 2008
Published in: Advances in Cryptology – EUROCRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-78967-3_30
Related Items (12)
Pattern matching on encrypted streams ⋮ Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity ⋮ Everlasting UC commitments from fully malicious PUFs ⋮ Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens ⋮ (Efficient) universally composable oblivious transfer using a minimal number of stateless tokens ⋮ Non-interactive secure computation from one-way functions ⋮ Secure Outsourced Computation ⋮ Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model ⋮ One-Time Programs ⋮ Secure Set Intersection with Untrusted Hardware Tokens ⋮ UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens ⋮ Founding Cryptography on Tamper-Proof Hardware Tokens
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Quantum cryptography: public key distribution and coin tossing
- On the limitations of universally composable two-party computation without set-up assumptions
- Universally composable two-party and multi-party secure computation
- Universally Composable Security with Global Setup
- Universally Composable Multiparty Computation with Partially Isolated Parties
- Cryptography in the Multi-string Model
- On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions
- A Parallel Repetition Theorem
- Universally Composable Multi-party Computation Using Tamper-Proof Hardware
- Automata, Languages and Programming
- Theory of Cryptography
This page was built for publication: David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware