منابع مشابه
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the problem of software protection via oblivious RAM. Goldwasser, Kalai, and Rothblum introduced the concept of one-time programs: in a one-time program, an honest sender sends a set of simple hardware tokens to a (potenti...
متن کاملTamper-Proof Annotations, By Construction
Current mobile-code formats require veri cation by the code recipient to guard against potentially malicious actions of an incoming mobile program. Such veri cation is needed even when a mobile program originated in a \safe" language such as Java, because the transmission might have been corrupted by an adversary. We describe an alternative approach based on a family of mobile code formats that...
متن کاملTamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience
Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that the tampered device will reveal secret information. Inspired by the work of Ishai et al. [Eurocrypt’06], we propose a compiler that transforms any circuit into a new circuit with the same functionality, but which is resilient ...
متن کاملOn the power of quantum tamper-proof devices
We show how quantum tamper-proof devices (QTPD) can be used to attack and to develop security protocols. On one hand, we prove that it is possible to transfer proofs of zero-knowledge protocols using QTPD’s. This attack can be extended to other security schemes where privacy is important. On the other hand, we present a fair contract signing protocol using QTPD’s where there is no communication...
متن کاملOn Key Agreement Protocols Based on Tamper-Proof Hardware
A key agreement (or distribution) protocol is a set of communication rules whereby two users can establish a shared common key. The shared key can be used by the users in future secure communications. We analyze a key agreement protocol presented by Leighton and Micali at the CRYlTO’93 conference, which is based on tamper-proof hardware, and show that the protocol fails in that a common key sha...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 1989
ISSN: 0028-0836,1476-4687
DOI: 10.1038/342465b0