搜索结果: 1-7 共查到“Hardware Tokens”相关记录7条 . 查询时间(0.046 秒)
Universally Composable (Non-Interactive) Two-Party Computation from Untrusted Reusable Hardware Tokens
universal composability tamper-proof hardware signatures
font style='font-size:12px;'>
2016/6/17
Universally composable protocols provide security even in highly complex environments like
the Internet. Without setup assumptions, however, UC-secure realizations of cryptographic
tasks are impossi...
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
secure computation smart cards implementation
font style='font-size:12px;'>
2016/1/9
Secure two-party computation allows two mutually distrusting parties to jointly compute an arbitrary function on their private inputs without revealing anything but the result. An interesting target f...
General Statistically Secure Computation with Bounded-Resettable Hardware Tokens
resettable tamper-proof hardware universal composability statistical security
font style='font-size:12px;'>
2016/1/8
Universally composable secure computation was assumed to require trusted setups, until it
was realized that parties exchanging (untrusted) tamper-proof hardware tokens allow an alternative
approach ...
Integration of hardware tokens in the Idemix library
Attribute-based credentials smart cards privacy
font style='font-size:12px;'>
2016/1/7
The Idemix library provides the implementation of the
Camenisch-Lysyanskaya (CL) Attribute-based Credential System (ABC),
its protocol extensions and the U-Prove ABC [3, 7]. In the case of the
CL A...
Weakening the Isolation Assumption of Tamper-proof Hardware Tokens
Hardware Tokens Isolation Assumption UC security
font style='font-size:12px;'>
2016/1/4
Recent results have shown the usefulness of tamper-proof hardware tokens as a setup
assumption for building UC-secure two-party computation protocols, thus providing broad
security guarantees and al...
Functional Encryption from (Small) Hardware Tokens
Functional Encryption Hardware Tokens
font style='font-size:12px;'>
2016/1/4
Functional encryption (FE) enables fine-grained access control of encrypted data while
promising simplified key management. In the past few years substantial progress has been made on
functional enc...
Embedded SFE: Offloading Server and Network using Hardware Tokens(Full Version)
Embedded SFE Offloading Server Network Hardware Tokens
font style='font-size:12px;'>
2009/12/29
We consider Secure Function Evaluation (SFE) in the clientserver
setting where the server issues a secure token to the client. The
token is not trusted by the client and is not a trusted third party...