You are looking at a specific version 20160616:192814 of this paper. See the latest version.

Paper 2016/615

Universally Composable (Non-Interactive) Two-Party Computation from Untrusted Reusable Hardware Tokens

Jeremias Mechler and Jörn Müller-Quade and Tobias Nilges

Abstract

Universally composable protocols provide security even in highly complex environments like the Internet. Without setup assumptions, however, UC-secure realizations of cryptographic tasks are impossible. To achieve efficient protocols, practical setup assumptions are needed. Tamper-proof hardware tokens, e.g. smart cards and USB tokens, can be used for this purpose. Apart from the fact that they are widely available, they are also cheap to manufacture and well understood. However, currently considered protocols based on tamper-proof hardware require a protocol-specific functionality of the hardware which cannot be reused for other protocols. For this to become possible, in addition to a versatile functionality, the hardware has to be modeled as a global setup. We propose the first formalization of tamper-proof hardware as an untrusted global setup assumption. Based on this setup, we construct protocols for both UC-secure two-party computation and UC-secure non-interactive secure computation. The token functionality that we choose is a simple signature functionality, i.e. our protocols can be realized with currently available signature cards.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint. MINOR revision.
Keywords
universal composabilitytamper-proof hardwaresignatures
Contact author(s)
tobias nilges @ cs au dk
History
2018-06-14: revised
2016-06-16: received
See all versions
Short URL
https://ia.cr/2016/615
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.