A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Secure Computation Using Leaky Tokens
[chapter]
2014
Lecture Notes in Computer Science
Leakage-proof hardware tokens have been used to achieve a large number of cryptographic tasks recently. But in real life, due to various physical attacks, it is extremely difficult to construct hardware devices that are guaranteed to be leakage-proof. In this paper, we study the feasibility of general two-party computation using leaky hardware tokens. Our main result is a completeness theorem that shows that every nontrivial leaky two-party functionality can be used for general secure
doi:10.1007/978-3-662-43948-7_75
fatcat:7pr2e5sz4jflrjsqgziyufciwy