A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
How to Securely Outsource Cryptographic Computations
[chapter]
2005
Lecture Notes in Computer Science
We address the problem of using untrusted (potentially malicious) cryptographic helpers. We provide a formal security definition for securely outsourcing computations from a computationally limited device to an untrusted helper. In our model, the adversarial environment writes the software for the helper, but then does not have direct communication with it once the device starts relying on it. In addition to security, we also provide a framework for quantifying the efficiency and checkability
doi:10.1007/978-3-540-30576-7_15
fatcat:hk6awz63xvaczgci5ynl77vghu