【24h】

Secure Computation Using Leaky Tokens

机译:使用泄漏令牌进行安全计算

获取原文

摘要

Leakage-proof hardware tokens have been used to achieve a large number of cryptographic tasks recently. But in real life, due to various physical attacks, it is extremely difficult to construct hardware devices that are guaranteed to be leakage-proof. In this paper, we study the feasibility of general two-party computation using leaky hardware tokens. Our main result is a completeness theorem that shows that every non-trivial leaky two-party functionality can be used for general secure computation. In fact, the protocol we construct is non-interactive and unconditionally secure. There are no restrictions on the leakage functions associated with the token, except that it does not render the tokens trivial, by revealing its entire secrets to the adversary.
机译:防泄漏硬件令​​牌最近已用于实现大量加密任务。但是在现实生活中,由于各种物理攻击,构造保证防泄漏的硬件设备极为困难。在本文中,我们研究了使用泄漏硬件令​​牌进行通用两方计算的可行性。我们的主要结果是一个完备性定理,表明所有非平凡的泄漏两方功能都可用于常规安全计算。实际上,我们构建的协议是非交互的且无条件安全的。对与令牌关联的泄漏函数没有任何限制,只是它不会通过向对手揭示其全部秘密来使令牌变得无关紧要。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号