搜索结果: 1-15 共查到“Tokens”相关记录17条 . 查询时间(0.093 秒)
Issue, Trade, Redeem: Crossing Systems Bounds with Cryptocurrency-Backed Tokens
Bitcoin Ethereum blockchain
font style='font-size:12px;'>
2018/7/9
The ecosystem of cryptocurrencies has been steadily growing since the introduction of Bitcoin, the first decentralised digital currency. While the notion of trustless asset exchange lies at the core o...
Quantum Tokens for Digital Signatures
Quantum cryptography digital signatures token
font style='font-size:12px;'>
2017/2/20
The fisherman caught a quantum fish. "Fisherman, please let me go", begged the fish, "and I will grant you three wishes". The fisherman agreed. The fish gave the fisherman a quantum computer, three qu...
Universally Composable (Non-Interactive) Two-Party Computation from Untrusted Reusable Hardware Tokens
universal composability tamper-proof hardware signatures
font style='font-size:12px;'>
2016/6/17
Universally composable protocols provide security even in highly complex environments like
the Internet. Without setup assumptions, however, UC-secure realizations of cryptographic
tasks are impossi...
UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens
universal composability commitments attribute tokens
font style='font-size:12px;'>
2016/6/7
Complex cryptographic protocols are often designed from simple cryptographic primitives, such as signature schemes, encryption schemes, verifiable random functions, and zero-knowledge proofs, by bridg...
Implementing Pairing-Based Cryptosystems in USB Tokens
pairing identity-based cryptography
font style='font-size:12px;'>
2016/1/26
In the last decade, pairing-based cryptography has been one
of the most intensively studied subjects in cryptography. Various optimization
techniques have been developed to speed up the pairing comp...
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
secure computation smart cards implementation
font style='font-size:12px;'>
2016/1/9
Secure two-party computation allows two mutually distrusting parties to jointly compute an arbitrary function on their private inputs without revealing anything but the result. An interesting target f...
General Statistically Secure Computation with Bounded-Resettable Hardware Tokens
resettable tamper-proof hardware universal composability statistical security
font style='font-size:12px;'>
2016/1/8
Universally composable secure computation was assumed to require trusted setups, until it
was realized that parties exchanging (untrusted) tamper-proof hardware tokens allow an alternative
approach ...
Integration of hardware tokens in the Idemix library
Attribute-based credentials smart cards privacy
font style='font-size:12px;'>
2016/1/7
The Idemix library provides the implementation of the
Camenisch-Lysyanskaya (CL) Attribute-based Credential System (ABC),
its protocol extensions and the U-Prove ABC [3, 7]. In the case of the
CL A...
Weakening the Isolation Assumption of Tamper-proof Hardware Tokens
Hardware Tokens Isolation Assumption UC security
font style='font-size:12px;'>
2016/1/4
Recent results have shown the usefulness of tamper-proof hardware tokens as a setup
assumption for building UC-secure two-party computation protocols, thus providing broad
security guarantees and al...
Functional Encryption from (Small) Hardware Tokens
Functional Encryption Hardware Tokens
font style='font-size:12px;'>
2016/1/4
Functional encryption (FE) enables fine-grained access control of encrypted data while
promising simplified key management. In the past few years substantial progress has been made on
functional enc...
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens
cryptographic protocols
font style='font-size:12px;'>
2014/3/5
We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware for universally composable secure computation. As our main result, we show an efficient oblivious-transfe...
(Efficient) Universally Composable Two-Party Computation Using a Minimal Number of Stateless Tokens
(Efficient) Universally Composable Two-Party Computation Using a Minimal Number f Stateless Tokens
font style='font-size:12px;'>
2012/6/14
We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware tokens for universally composable secure computation with no additional setup. As our main result, we sho...
(Efficient) Universally Composable Two-Party Computation Using a Minimal Number of Stateless Tokens
Minimal Number Stateless Tokens
font style='font-size:12px;'>
2012/3/20
We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware tokens for universally composable secure computation with no additional setup. As our main result, we sho...
(Efficient) Universally Composable Two-Party Computation Using a Minimal Number of Stateless Tokens
Universally Composable Two-Party Computation Using Minimal Number
font style='font-size:12px;'>
2012/8/28
We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware tokens for universally composable secure computation with no additional setup. As our main result, we sho...
Embedded SFE: Offloading Server and Network using Hardware Tokens(Full Version)
Embedded SFE Offloading Server Network Hardware Tokens
font style='font-size:12px;'>
2009/12/29
We consider Secure Function Evaluation (SFE) in the clientserver
setting where the server issues a secure token to the client. The
token is not trusted by the client and is not a trusted third party...