搜索结果: 1-2 共查到“UC Secure Computation”相关记录2条 . 查询时间(0.134 秒)
New Feasibility Results in Unconditional UC-Secure Computation with (Malicious) PUFs
Physically uncloneable functions UC security hardware setup assumptions
2016/6/22
Brzuska \etal. (Crypto 2011) proved that unconditional UC-secure computation is possible if parties have access to honestly generated physically unclonable functions (PUFs). Dachman-Soled \etal. (Cryp...
New Constructions for UC Secure Computation using Tamper-proof Hardware
New Constructions UC Secure Computation Tamper-proof Hardware
2008/8/12
The Universal Composability framework was introduced by Canetti to study the security
of protocols which are concurrently executed with other protocols in a network environment.
Unfortunately it was...