搜索结果: 1-7 共查到“军事学 Hardware Tokens”相关记录7条 . 查询时间(0.105 秒)
Universally Composable (Non-Interactive) Two-Party Computation from Untrusted Reusable Hardware Tokens
universal composability tamper-proof hardware signatures
2016/6/17
Universally composable protocols provide security even in highly complex environments like
the Internet. Without setup assumptions, however, UC-secure realizations of cryptographic
tasks are impossi...
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
secure computation smart cards implementation
2016/1/9
Secure two-party computation allows two mutually distrusting parties to jointly compute an arbitrary function on their private inputs without revealing anything but the result. An interesting target f...
General Statistically Secure Computation with Bounded-Resettable Hardware Tokens
resettable tamper-proof hardware universal composability statistical security
2016/1/8
Universally composable secure computation was assumed to require trusted setups, until it
was realized that parties exchanging (untrusted) tamper-proof hardware tokens allow an alternative
approach ...
Integration of hardware tokens in the Idemix library
Attribute-based credentials smart cards privacy
2016/1/7
The Idemix library provides the implementation of the
Camenisch-Lysyanskaya (CL) Attribute-based Credential System (ABC),
its protocol extensions and the U-Prove ABC [3, 7]. In the case of the
CL A...
Weakening the Isolation Assumption of Tamper-proof Hardware Tokens
Hardware Tokens Isolation Assumption UC security
2016/1/4
Recent results have shown the usefulness of tamper-proof hardware tokens as a setup
assumption for building UC-secure two-party computation protocols, thus providing broad
security guarantees and al...
Functional encryption (FE) enables fine-grained access control of encrypted data while
promising simplified key management. In the past few years substantial progress has been made on
functional enc...
Embedded SFE: Offloading Server and Network using Hardware Tokens(Full Version)
Embedded SFE Offloading Server Network Hardware Tokens
2009/12/29
We consider Secure Function Evaluation (SFE) in the clientserver
setting where the server issues a secure token to the client. The
token is not trusted by the client and is not a trusted third party...