×
Feb 25, 2016 · We present two compilers that transform UC-secure protocols in the stateful hardware model into UC-secure protocols in the resettable hardware model.
Nov 28, 2015 · Universally composable multi-party computation is impossible without setup assumptions. Motivated by the ubiquitous use of secure hardware ...
In this work we show that any UC-functionality that can be implemented by a protocol using a single untrusted stateful hardware token can likewise be ...
From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions. Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade, Tobias Nilges.
From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions. Döttling, Nico and Kraschewski, Daniel and Müller-Quade, Jörn and Nilges, Tobias.
From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions ... using a single stateful tamper-proof hardware token. In: Ishai, Y. (ed.) TCC ...
Jan 11, 2019 · (2015) From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions. In: ProvSec. Full text not available from this repository.
From stateful hardware to resettable hardware using symmetric assumptions. Döttling N (2015). Publication Status: Published. Publication Type: Authored book ...
Researchr is a web site for finding, collecting, sharing, and reviewing scientific publications, for researchers by researchers. Sign up for an account to ...
Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade, Tobias Nilges: From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions.