A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
How to keep a secret
2013
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13
How is it possible to prevent the sharing of cryptographic functions? This question appears to be fundamentally hard to address since in this setting the owner of the key is the adversary: she wishes to share a program or device that (potentially only partly) implements her main cryptographic functionality. Given that she possesses the cryptographic key, it is impossible for her to be prevented from writing code or building a device that uses that key. She may though be deterred from doing so.
doi:10.1145/2508859.2516691
dblp:conf/ccs/KiayiasT13
fatcat:g5bellremjdrxdqo73gpnhu5wa