log in  |  register  |  feedback?  |  help  |  web accessibility
Logo
One-Time Programs from Commodity Hardware
Matt Green - https://isi.jhu.edu/~mgreen/
Thursday, February 24, 2022, 3:00-4:00 pm Calendar
  • You are subscribed to this talk through .
  • You are watching this talk through .
  • You are subscribed to this talk. (unsubscribe, watch)
  • You are watching this talk. (unwatch, subscribe)
  • You are not subscribed to this talk. (watch, subscribe)
Abstract

One-time programs, formulated by Goldwasser et al. are a flexible and powerful cryptographic primitive. Unfortunately, instantiating this primitive requires specialized "one-time memory" hardware that is not widely available. In this talk we investigate the possibility of realizing one-time programs from a more common hardware functionality: the "counter lockbox." A counter lockbox is a stateful functionality that protects an encryption key under a user-specified password, while enforcing a limited number of incorrect guesses; such hardware-backed functionalities have recently been made available in many consumer devices and cloud platforms. We show that counter lockboxes can be used to emulate the functionality of one-time memory, and thus implement one-time programs. We develop a number of techniques to reduce the number of counter lockboxes required for our constructions, that may be of independent interest.

=========

https://umd.zoom.us/j/97585901703
Meeting ID: 975 8590 1703

This talk is organized by David Miller