메뉴 건너뛰기




Volumn 5157 LNCS, Issue , 2008, Pages 39-56

One-time programs

Author keywords

[No Author keywords available]

Indexed keywords

BLACK-BOX FUNCTIONS; COMPUTATIONAL PARADIGMS; CONCEPTUAL RESEARCH; CRYPTOLOGY; ELECTRONIC-CASH; NEW CONCEPT; OBLIVIOUS TRANSFER PROTOCOLS; PROGRAM OBFUSCATION; RUN-TIME; SECRET KEYS; SECURITY APPLICATIONS; SELF DESTRUCT; SINGLE INPUT; SOFTWARE PROTECTION;

EID: 51849168583     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-85174-5_3     Document Type: Conference Paper
Times cited : (172)

References (31)
  • 3
    • 51849087086 scopus 로고
    • Microprocessor for executing enciphered programs
    • Best, R.M.: Us patent 4,168,396: Microprocessor for executing enciphered programs (1979)
    • (1979) Us patent , vol.4 , pp. 168-396
    • Best, R.M.1
  • 4
    • 0003153237 scopus 로고
    • Non-interactive zero-knowledge and its applications (extended abstract)
    • Chicago, Illinois, pp
    • Blum, M., Feldman, P., Micali, S.: Non-interactive zero-knowledge and its applications (extended abstract). In: STOC 1988, Chicago, Illinois, pp. 103-112 (1988)
    • (1988) STOC , pp. 103-112
    • Blum, M.1    Feldman, P.2    Micali, S.3
  • 5
    • 79251578513 scopus 로고    scopus 로고
    • On the (im)possibility of obfuscating programs
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (im)possibility of obfuscating programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1-18. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 1-18
    • Barak, B.1    Goldreich, O.2    Impagliazzo, R.3    Rudich, S.4    Sahai, A.5    Vadhan, S.P.6    Yang, K.7
  • 6
    • 51849085942 scopus 로고
    • Personal communication
    • Blum, M.: Personal communication (1981)
    • (1981)
    • Blum, M.1
  • 7
    • 0003384765 scopus 로고
    • How to prove a theorem so no-one else can claim it
    • Blum, M.: How to prove a theorem so no-one else can claim it. In: Proceedings of ICML, pp. 1444-1451 (1987)
    • (1987) Proceedings of ICML , pp. 1444-1451
    • Blum, M.1
  • 8
    • 32844469026 scopus 로고    scopus 로고
    • Lower bounds for non-black-box zero knowledge
    • Barak, B., Lindell, Y., Vadhan, S.P.: Lower bounds for non-black-box zero knowledge. J. Comput. Syst. Sci. 72(2), 321-391 (2006)
    • (2006) J. Comput. Syst. Sci , vol.72 , Issue.2 , pp. 321-391
    • Barak, B.1    Lindell, Y.2    Vadhan, S.P.3
  • 9
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • Chaum, D.: Blind signatures for untraceable payments. In: CRYPTO 1982, pp. 199-203 (1982)
    • (1982) CRYPTO 1982 , pp. 199-203
    • Chaum, D.1
  • 10
    • 0003062028 scopus 로고
    • Blind signature systems
    • Chaum, D.: Blind signature systems. In: CRYPTO 1983, pp. 153-156 (1983)
    • (1983) CRYPTO 1983 , pp. 153-156
    • Chaum, D.1
  • 12
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28(6), 637-647 (1985)
    • (1985) Commun. ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 13
    • 0000108216 scopus 로고    scopus 로고
    • How to construct constant-round zero-knowledge proof systems for np
    • Goldreich, O., Kahan, A.: How to construct constant-round zero-knowledge proof systems for np. J. Cryptology 9(3), 167-190 (1996)
    • (1996) J. Cryptology , vol.9 , Issue.3 , pp. 167-190
    • Goldreich, O.1    Kahan, A.2
  • 14
    • 33748600953 scopus 로고    scopus 로고
    • Goldwasser, S., Kalai, Y.T.: On the impossibility of obfuscation with auxiliary input. In: Tardos, É. (ed.) FOCS 2005, pp. 553-562. IEEE Computer Society, Los Alamitos (2005)
    • Goldwasser, S., Kalai, Y.T.: On the impossibility of obfuscation with auxiliary input. In: Tardos, É. (ed.) FOCS 2005, pp. 553-562. IEEE Computer Society, Los Alamitos (2005)
  • 15
    • 35048896529 scopus 로고    scopus 로고
    • Gennaro, R., Lysyanskaya, A., Malkin, T., Micali, S., Rabin, T.: Algorithmic tamper-proof (atp) security: Theoretical foundations for security against hardware tampering. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 258-277. Springer, Heidelberg (2004)
    • Gennaro, R., Lysyanskaya, A., Malkin, T., Micali, S., Rabin, T.: Algorithmic tamper-proof (atp) security: Theoretical foundations for security against hardware tampering. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 258-277. Springer, Heidelberg (2004)
  • 16
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof-systems
    • Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. SIAM Journal on Computing 18(1), 186-208 (1989)
    • (1989) SIAM Journal on Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 17
    • 71149116146 scopus 로고
    • Proofs that yield nothing but their validity, or all languages in np have zero-knowledge proof systems
    • Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity, or all languages in np have zero-knowledge proof systems. Journal of the ACM 38(1), 691-729 (1991)
    • (1991) Journal of the ACM , vol.38 , Issue.1 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 18
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious rams
    • Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious rams. Journal of the ACM 43(3), 431-473 (1996)
    • (1996) Journal of the ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 19
    • 33746066725 scopus 로고    scopus 로고
    • Private circuits ii: Keeping secrets in tamperable circuits
    • Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
    • Ishai, Y., Prabhakaran, M., Sahai, A., Wagner, D.: Private circuits ii: Keeping secrets in tamperable circuits. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 308-327. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 308-327
    • Ishai, Y.1    Prabhakaran, M.2    Sahai, A.3    Wagner, D.4
  • 20
    • 35248830337 scopus 로고    scopus 로고
    • Private circuits: Securing hardware against probing attacks
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Ishai, Y., Sahai, A., Wagner, D.: Private circuits: Securing hardware against probing attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463-481. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 463-481
    • Ishai, Y.1    Sahai, A.2    Wagner, D.3
  • 21
    • 38049150653 scopus 로고    scopus 로고
    • Universally composable multi-party computation using tamper-proof hardware
    • Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
    • Katz, J.: Universally composable multi-party computation using tamper-proof hardware. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 115-128. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 115-128
    • Katz, J.1
  • 23
    • 26444553313 scopus 로고    scopus 로고
    • Basingcryptographicprotocolsontamper-evidentseals
    • Caires, L, Italiano, G.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
    • Moran,T.,Naor,M.:Basingcryptographicprotocolsontamper-evidentseals. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 285-297. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3580 , pp. 285-297
    • Moran, T.1    Naor, M.2
  • 24
    • 35048852134 scopus 로고    scopus 로고
    • Micali, S., Reyzin, L.: Physically observable cryptography (extended abstract). In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 278-296. Springer, Heidelberg (2004)
    • Micali, S., Reyzin, L.: Physically observable cryptography (extended abstract). In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 278-296. Springer, Heidelberg (2004)
  • 25
    • 44449101614 scopus 로고    scopus 로고
    • David and goliath commitments: Uc computation for asymmetric parties using tamper-proof hardware
    • Smart, N, ed, EUROCRYPT 2008, Springer, Heidelberg
    • Moran, T., Segev, G.: David and goliath commitments: Uc computation for asymmetric parties using tamper-proof hardware. In: Smart, N. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 527-544. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 527-544
    • Moran, T.1    Segev, G.2
  • 26
    • 35248825608 scopus 로고    scopus 로고
    • On deniability in the common reference string and random oracle model
    • Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
    • Pass, R.: On deniability in the common reference string and random oracle model. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 316-337. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 316-337
    • Pass, R.1
  • 27
    • 77953754678 scopus 로고    scopus 로고
    • How to exchange secrets with oblivious transfer. Cryptology ePrint Archive
    • Report 2005/187
    • Rabin, M.O.: How to exchange secrets with oblivious transfer. Cryptology ePrint Archive, Report 2005/187 (2005)
    • (2005)
    • Rabin, M.O.1
  • 28
    • 33745125579 scopus 로고
    • Non-interactive zero-knowledge with preprocessing
    • Goldwasser, S, ed, CRYPTO 1988, Springer, Heidelberg
    • De Santis, A., Micali, S., Persiano, G.: Non-interactive zero-knowledge with preprocessing. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 269-282. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.403 , pp. 269-282
    • De Santis, A.1    Micali, S.2    Persiano, G.3
  • 29
    • 34547182340 scopus 로고    scopus 로고
    • Virtual monotonic counters and count-limited objects using a tpm without a trusted os (extended version). Technical Report 2006-064
    • Sarmenta, L.F.G., van Dijk, M., O'Donnell, C.W., Rhodes, J., Devadas, S.: Virtual monotonic counters and count-limited objects using a tpm without a trusted os (extended version). Technical Report 2006-064, MIT CSAIL Technical Report (2006)
    • (2006) MIT CSAIL Technical Report
    • Sarmenta, L.F.G.1    van Dijk, M.2    O'Donnell, C.W.3    Rhodes, J.4    Devadas, S.5
  • 30
    • 51849135296 scopus 로고    scopus 로고
    • Trusted computing group trusted platform module (tpm) specifications 2007
    • Trusted computing group trusted platform module (tpm) specifications (2007)
  • 31
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • Yao, A.C.: How to generate and exchange secrets. In: FOCS 1986, pp. 162-167 (1986)
    • (1986) FOCS 1986 , pp. 162-167
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.