A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions
[chapter]
2015
Lecture Notes in Computer Science
Universally composable multi-party computation is impossible without setup assumptions. Motivated by the ubiquitous use of secure hardware in many real world security applications, Katz (EUROCRYPT 2007) proposed a model of tamper-proof hardware as a UC-setup assumption. An important aspect of this model is whether the hardware token is allowed to hold a state or not. Real world examples of tamper-proof hardware that can hold a state are expensive hardware security modules commonly used in
doi:10.1007/978-3-319-26059-4_2
fatcat:rbttqcxwz5btfj6xhxwcgkk3i4