状态硬件复位硬件对称的假设From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions.pdf
- 1、本文档共21页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
状态硬件复位硬件对称的假设From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions
From Stateful to Resettable
Hardware Using Symmetric
Assumptions
Nico D枚ttling, Daniel Kraschewski, J枚rn M眉ller-Quade Tobias
Nilges
Aarhus University, TNG Technology Consulting GmbH, Karlsruhe
Institute of Technology
General Setting
Alice Bob
肀犿睋
螤
鈩
鈩 is arbitrary functionality, e.g. OT, Commitment鈥?
Motivation
鈥 UC-secure protocols impossible
without setup-assumptions
鈥 [Katz07] introduced tamper-
proof hardware as a UC setup-
assumption
鈥 Stateful token: statistically UC-
secure OT is possible [DKM11]
What about resettable tokens?
鈥 Still powerful, but most
statistically secure protocols
impossible [GIMS10]
鈥 Feasibility of NI-2PC for
resettable functionalities shown
by [DMMN13]
鈥 Open question: relation
between stateful and resettable
token protocols wrt feasibility?
Our Results
鈥 All protocols based on stateful tokens can be
transformed to use resettable tokens
鈥 General compiler for UC-secure protocols
鈥 Requires interaction
鈥 Requires computational assumptions (only OWF!)
or additional setup
Basic Idea
鈥 Shift state from token to Alice:
鈥 Alice authenticates inputs
鈥 Bob sends authenticated value to token
鈥 Problem: Alice must not learn Bob鈥榮 inputs
鈥 Solution:
鈥 Alice authenticates encoding of input
鈥 Bob provides authentication and decoding
information
Blueprint of Our Approach
Alice Bob
鈥 Generate token
program 饊亣
Token
鈥 Interaction wit
文档评论(0)