Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
Tam- per-proof hardware tokens allow information-theoretically secure protocols which are universally composable (UC) [4], they can be employed for protocols in ...
Cryptographic assumptions regarding tamper proof hardware tokens have gained increasing attention. Even if the tamper-proof hardware is issued by one of the ...
Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token. Authors: Nico Döttling · Daniel Kraschewski · Jörn Müller-Quade.
Jul 18, 2019 · Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token ; TCC Theory of Cryptography Conference · Nico Döttling.
Unconditional and composable security using a single stateful tamper-proof hardware token. Döttling N (2011). Publication Status: Published.
Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token ; Publikationsjahr, 2011 ; Sprache, Englisch ; Identifikator, ISBN: 978-3 ...
In this work we present the first protocol realizing universally composable two-party computations (and even trusted One-Time-Programs) with information- ...
People also ask
Unconditional and composable security using a single stateful tamper-proof hardware token. TCC'11: Proceedings of the 8th conference on Theory of cryptography.
We show that by exchanging simple stateful hardware tokens, any functionality can be realized with unconditional security against malicious parties. In the case ...
Missing: Single | Show results with:Single
Universally composable OT based on tamper-proof hardware tokens. The security parameter is denoted by λ and TE means token encapsulation. stateless tokens.