搜索结果: 1-2 共查到“军事学 Hardware Token Model”相关记录2条 . 查询时间(0.375 秒)
Universally Composable Secure Two and Multi-party Computation in the Corruptible Tamper-Proof Hardware Token Model
tamper-proof token corruptible setup assumption
2017/11/13
In this work we introduce the corruptible token model. This model generalizes the stateless tamper-proof token model introduced by Katz (EUROCRYPT '07) and relaxes the trust assumption. Our improved m...
We study the complexity of secure computation in the tamper-proof hardware token model. Our main focus is on non-interactive unconditional two-party computation using bit-OT tokens, but we also study ...