You are looking at a specific version 20150630:152024 of this paper. See the latest version.

Paper 2015/104

Weakening the Isolation Assumption of Tamper-proof Hardware Tokens

Rafael Dowsley and Jörn Müller-Quade and Tobias Nilges

Abstract

Recent results have shown the usefulness of tamper-proof hardware tokens as a setup assumption for building UC-secure two-party computation protocols, thus providing broad security guarantees and allowing the use of such protocols as buildings blocks in the modular design of complex cryptography protocols. All these works have in common that they assume the tokens to be completely isolated from their creator, but this is a strong assumption. In this work we investigate the feasibility of cryptographic protocols in the setting where the isolation of the hardware token is weakened. We consider two cases: (1) the token can relay messages to its creator, or (2) the creator can send messages to the token after it is sent to the receiver. We provide a detailed characterization for both settings, presenting both impossibilities and information-theoretically secure solutions.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Major revision. ICITS 2015
Keywords
Hardware TokensIsolation AssumptionUC securityOne-Time MemoryOblivious Transfer.
Contact author(s)
rafael dowsley @ kit edu
History
2015-06-30: last of 2 revisions
2015-02-23: received
See all versions
Short URL
https://ia.cr/2015/104
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.