搜索结果: 1-15 共查到“Tokens”相关记录17条 . 查询时间(0.039 秒)
Issue, Trade, Redeem: Crossing Systems Bounds with Cryptocurrency-Backed Tokens
Bitcoin Ethereum blockchain
2018/7/9
The ecosystem of cryptocurrencies has been steadily growing since the introduction of Bitcoin, the first decentralised digital currency. While the notion of trustless asset exchange lies at the core o...
The fisherman caught a quantum fish. "Fisherman, please let me go", begged the fish, "and I will grant you three wishes". The fisherman agreed. The fish gave the fisherman a quantum computer, three qu...
Universally Composable (Non-Interactive) Two-Party Computation from Untrusted Reusable Hardware Tokens
universal composability tamper-proof hardware signatures
2016/6/17
Universally composable protocols provide security even in highly complex environments like
the Internet. Without setup assumptions, however, UC-secure realizations of cryptographic
tasks are impossi...
UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens
universal composability commitments attribute tokens
2016/6/7
Complex cryptographic protocols are often designed from simple cryptographic primitives, such as signature schemes, encryption schemes, verifiable random functions, and zero-knowledge proofs, by bridg...
Implementing Pairing-Based Cryptosystems in USB Tokens
pairing identity-based cryptography
2016/1/26
In the last decade, pairing-based cryptography has been one
of the most intensively studied subjects in cryptography. Various optimization
techniques have been developed to speed up the pairing comp...
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
secure computation smart cards implementation
2016/1/9
Secure two-party computation allows two mutually distrusting parties to jointly compute an arbitrary function on their private inputs without revealing anything but the result. An interesting target f...
General Statistically Secure Computation with Bounded-Resettable Hardware Tokens
resettable tamper-proof hardware universal composability statistical security
2016/1/8
Universally composable secure computation was assumed to require trusted setups, until it
was realized that parties exchanging (untrusted) tamper-proof hardware tokens allow an alternative
approach ...
Integration of hardware tokens in the Idemix library
Attribute-based credentials smart cards privacy
2016/1/7
The Idemix library provides the implementation of the
Camenisch-Lysyanskaya (CL) Attribute-based Credential System (ABC),
its protocol extensions and the U-Prove ABC [3, 7]. In the case of the
CL A...
Weakening the Isolation Assumption of Tamper-proof Hardware Tokens
Hardware Tokens Isolation Assumption UC security
2016/1/4
Recent results have shown the usefulness of tamper-proof hardware tokens as a setup
assumption for building UC-secure two-party computation protocols, thus providing broad
security guarantees and al...
Functional encryption (FE) enables fine-grained access control of encrypted data while
promising simplified key management. In the past few years substantial progress has been made on
functional enc...
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens
cryptographic protocols
2014/3/5
We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware for universally composable secure computation. As our main result, we show an efficient oblivious-transfe...
(Efficient) Universally Composable Two-Party Computation Using a Minimal Number of Stateless Tokens
(Efficient) Universally Composable Two-Party Computation Using a Minimal Number f Stateless Tokens
2012/6/14
We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware tokens for universally composable secure computation with no additional setup. As our main result, we sho...
(Efficient) Universally Composable Two-Party Computation Using a Minimal Number of Stateless Tokens
Minimal Number Stateless Tokens
2012/3/20
We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware tokens for universally composable secure computation with no additional setup. As our main result, we sho...
(Efficient) Universally Composable Two-Party Computation Using a Minimal Number of Stateless Tokens
Universally Composable Two-Party Computation Using Minimal Number
2012/8/28
We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware tokens for universally composable secure computation with no additional setup. As our main result, we sho...
Embedded SFE: Offloading Server and Network using Hardware Tokens(Full Version)
Embedded SFE Offloading Server Network Hardware Tokens
2009/12/29
We consider Secure Function Evaluation (SFE) in the clientserver
setting where the server issues a secure token to the client. The
token is not trusted by the client and is not a trusted third party...