Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2010)
Embedded SFE: Offloading Server and Network using Hardware Tokens.
14. International Conference on Financial Cryptography and Data Security (FC'10). Tenerife, Canary Islands (25.01.2010-28.10.2010)
doi: 10.1007/978-3-642-14577-3_17
Konferenzveröffentlichung, Bibliographie
Kurzbeschreibung (Abstract)
We consider Secure Function Evaluation (SFE) in the client-server setting where the server issues a secure token to the client. The token is not trusted by the client and is not a trusted third party.
We show how to take advantage of the token to drastically reduce the communication complexity of SFE and computation load of the server.
Our main contribution is the detailed consideration of design decisions, optimizations, and trade-offs, associated with the setting and its strict hardware requirements for practical deployment. In particular, we model the token as a computationally weak device with small constant-size memory and limit communication between client and server.
We consider semi-honest, covert, and malicious adversaries. We show the feasibility of our protocols based on a FPGA implementation.
Typ des Eintrags: | Konferenzveröffentlichung |
---|---|
Erschienen: | 2010 |
Autor(en): | Järvinen, Kimmo ; Kolesnikov, Vladimir ; Sadeghi, Ahmad-Reza ; Schneider, Thomas |
Art des Eintrags: | Bibliographie |
Titel: | Embedded SFE: Offloading Server and Network using Hardware Tokens |
Sprache: | Englisch |
Publikationsjahr: | Januar 2010 |
Ort: | Berlin |
Verlag: | Springer |
Buchtitel: | Financial Cryptography and Data Security (FC 2010) |
Veranstaltungstitel: | 14. International Conference on Financial Cryptography and Data Security (FC'10) |
Veranstaltungsort: | Tenerife, Canary Islands |
Veranstaltungsdatum: | 25.01.2010-28.10.2010 |
DOI: | 10.1007/978-3-642-14577-3_17 |
URL / URN: | https://encrypto.de/papers/JKSS10TOKEN.pdf |
Kurzbeschreibung (Abstract): | We consider Secure Function Evaluation (SFE) in the client-server setting where the server issues a secure token to the client. The token is not trusted by the client and is not a trusted third party. We show how to take advantage of the token to drastically reduce the communication complexity of SFE and computation load of the server. Our main contribution is the detailed consideration of design decisions, optimizations, and trade-offs, associated with the setting and its strict hardware requirements for practical deployment. In particular, we model the token as a computationally weak device with small constant-size memory and limit communication between client and server. We consider semi-honest, covert, and malicious adversaries. We show the feasibility of our protocols based on a FPGA implementation. |
Fachbereich(e)/-gebiet(e): | 20 Fachbereich Informatik Zentrale Einrichtungen 20 Fachbereich Informatik > EC SPRIDE 20 Fachbereich Informatik > EC SPRIDE > Engineering Cryptographic Protocols (am 01.03.18 aufgegangen in Praktische Kryptographie und Privatheit) |
Hinterlegungsdatum: | 25 Jun 2012 13:28 |
Letzte Änderung: | 31 Jul 2024 08:52 |
PPN: | |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
Frage zum Eintrag |
Optionen (nur für Redakteure)
Redaktionelle Details anzeigen |