Filters








7 Hits in 8.3 sec

David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware [chapter]

Tal Moran, Gil Segev
<i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5fby7eyrnbdfrnfd5ib4lkc2gu" style="color: black;">Advances in Cryptology – EUROCRYPT 2008</a> </i> &nbsp;
In this paper, we construct UC commitment protocols for "David" and "Goliath": we only require a single party (Goliath) to be capable of generating tokens.  ...  Each party is only required to trust that its own tokens are tamper-proof. Katz designed a UC commitment protocol that requires both parties to generate hardware tokens.  ...  commitment for each hardware token) if we assume the existence of tamper-proof hardware tokens.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-78967-3_30">doi:10.1007/978-3-540-78967-3_30</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/eurocrypt/MoranS08.html">dblp:conf/eurocrypt/MoranS08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/roj3rurdnfh6hdwqndaqo3fhk4">fatcat:roj3rurdnfh6hdwqndaqo3fhk4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20080424175749/http://eprint.iacr.org/2008/046.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b5/8c/b58c413fb896059b754cf36e58a59d99a2044f96.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-78967-3_30"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token [chapter]

Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade
<span title="">2011</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Even if the tamperproof hardware is issued by one of the parties, and hence not necessarily trusted by the other, many tasks become possible: Tamper proof hardware is sufficient for universally composable  ...  However, all known protocols employing tamper-proof hardware are either indirect, i.e., additional computational assumptions must be used to obtain general two party computations or a large number of devices  ...  We would like to thank the anonymous reviewers of TCC 2011 for their helpful comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-19571-6_11">doi:10.1007/978-3-642-19571-6_11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5nlayinf7rb33bsjp76p4tmghe">fatcat:5nlayinf7rb33bsjp76p4tmghe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20181030113607/https://link.springer.com/content/pdf/10.1007%2F978-3-642-19571-6_11.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/11/a8/11a8507d04b2a7f3638c728ae0ad6ab64d39d3f3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-19571-6_11"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Universally Composable Multiparty Computation with Partially Isolated Parties [chapter]

Ivan Damgård, Jesper Buus Nielsen, Daniel Wichs
<span title="">2009</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
The recent work of Katz shows that we may instead rely on physical assumptions, and in particular tamper-proof hardware tokens.  ...  For example, isolation might be achieved by asking Bob to put his functionality on a tamper-proof hardware token and assuming that Alice can prevent this token from communicating to the outside world.  ...  Only Goliath has the ability to create tamper-proof hardware tokens. Moreover, Goliath is not assumed to be computationally bounded (but David is).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-00457-5_19">doi:10.1007/978-3-642-00457-5_19</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/swtyisbl2rgwbjfqxx5lnj66uy">fatcat:swtyisbl2rgwbjfqxx5lnj66uy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180726212711/https://link.springer.com/content/pdf/10.1007%2F978-3-642-00457-5_19.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f8/64/f86440f5e6d288da138f83febe5102b57c085ac2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-00457-5_19"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

General Statistically Secure Computation with Bounded-Resettable Hardware Tokens [chapter]

Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade, Tobias Nilges
<span title="">2015</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Universally composable secure computation was assumed to require trusted setups, until it was realized that parties exchanging (untrusted) tamper-proof hardware tokens allow an alternative approach (Katz  ...  Using only a single stateful token, one can implement general statistically secure two-party computation (Döttling, Kraschewski, Müller-Quade; TCC 2011); though all security is lost if an adversarial token  ...  [MS08] Tal Moran and Gil Segev. David and Goliath commitments: UC computation for asymmetric parties using tamper-proof hardware. In Nigel P.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-46494-6_14">doi:10.1007/978-3-662-46494-6_14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2ymmpmlehzdm3lwuuiysleb2je">fatcat:2ymmpmlehzdm3lwuuiysleb2je</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160604131240/http://eprint.iacr.org/2014/555.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/35/38/353835160947babfb6ffcaf87df74ff3ade452fc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-46494-6_14"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Secure Computation Using Leaky Tokens [chapter]

Manoj Prabhakaran, Amit Sahai, Akshay Wadia
<span title="">2014</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In this paper, we study the feasibility of general two-party computation using leaky hardware tokens.  ...  Our main result is a completeness theorem that shows that every nontrivial leaky two-party functionality can be used for general secure computation.  ...  Tal Moran and Gil Segev. David and goliath commitments: Uc computation for asymmetric parties using tamper-proof hardware. In EUROCRYPT, pages 527- 544, 2008. 35.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-43948-7_75">doi:10.1007/978-3-662-43948-7_75</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7pr2e5sz4jflrjsqgziyufciwy">fatcat:7pr2e5sz4jflrjsqgziyufciwy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170829125759/http://mmp.web.engr.illinois.edu/pub/leakytokens.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e6/a1/e6a1bef511778752750b3fa2d14c182f0838c6e9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-43948-7_75"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Complete Primitives for Information-Theoretically Secure Two-Party Computation

Daniel Kraschewski
<span title="">2013</span>
The second result shows that any secure two-party computation can be based on a single reusable tamper-proof hardware token, although the receiver does not trust the token issuer.  ...  The first result is a full combinatorial characterization of all cryptogates that are powerful enough to be used for implementation of arbitrary secure computations.  ...  tamper-proof hardware sent from Goliath to David.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5445/ir/1000035100">doi:10.5445/ir/1000035100</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hj4iuzv27bbxjmbvjvhvzv4g5y">fatcat:hj4iuzv27bbxjmbvjvhvzv4g5y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200221110833/https://publikationen.bibliothek.kit.edu/1000035100/2613501" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/28/d6/28d6c439a828a9b961dab3b9de592629930d4988.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5445/ir/1000035100"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Corruption and Financial Crime

Sam Vaknin
<span title="2018-10-06">2018</span> <i title="Figshare"> Figshare </i> &nbsp;
Essays about corruption, money laundering, crime, and international finance.  ...  People do not perceive these acts as self-defense but as David vs. Goliath bullying. Sooner or later, the efficacy of such measures is bound to decline.  ...  The Chairman is no more and no less "in hock" than any leading member of a US political party.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.6084/m9.figshare.7176539">doi:10.6084/m9.figshare.7176539</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pjcdb2c32vh4fp2rlzx3p6qoke">fatcat:pjcdb2c32vh4fp2rlzx3p6qoke</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200213085529/https://s3-eu-west-1.amazonaws.com/pfigshare-u-files/13199291/corruption.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b5/88/b588f8025f8287aa02ee152be44638e1024d0ec6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.6084/m9.figshare.7176539"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> figshare.com </button> </a>