The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2019
DOI: 10.1007/978-3-030-32101-7_37
|View full text |Cite
|
Sign up to set email alerts
|

One-Time Programs Made Practical

Abstract: A one-time program (OTP) works as follows: Alice provides Bob with the implementation of some function. Bob can have the function evaluated exclusively on a single input of his choosing. Once executed, the program will fail to evaluate on any other input. State-of-the-art one-time programs have remained theoretical, requiring custom hardware that is cost-ineffective/unavailable, or confined to adhoc/unrealistic assumptions. To bridge this gap, we explore how the Trusted Execution Environment (TEE) of modern CP… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 36 publications
0
7
0
Order By: Relevance
“…It is impossible to avoid any piece of software to be copied and run again without using additional instrumentation. In the literature, different approaches for OTP implementation exist, from using dedicated hardware and complex cryptographic techniques (as in the first paper itself [ 30 ] and [ 33 ]) to extremely compelling approaches based on quantum computing [ 34 , 35 , 36 ]). In particular, Ref.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…It is impossible to avoid any piece of software to be copied and run again without using additional instrumentation. In the literature, different approaches for OTP implementation exist, from using dedicated hardware and complex cryptographic techniques (as in the first paper itself [ 30 ] and [ 33 ]) to extremely compelling approaches based on quantum computing [ 34 , 35 , 36 ]). In particular, Ref.…”
Section: Methodsmentioning
confidence: 99%
“…In particular, Ref. [ 33 ] seems to be a very promising idea because it uses hardware that is already present on most modern mobile devices.…”
Section: Methodsmentioning
confidence: 99%
“…It would be interesting to see how many of these problems, if any, can benefit from the introduction of trusted hardware. One example of this coupling is given by Zhao et al [222]; they investigate how TEEs may be used to realize one-time programs, ultimately building a system that uses Intel TXT in conjunction with the TPM. A unique and tailored approach to hardware-assisted computation may be necessary for each of the above problems, or it may be the case that several problems share characteristics that allow them to be tackled in a similar manner; such exploration would be an interesting direction for future work.…”
Section: Miscellaneousmentioning
confidence: 99%
“…However, it is easy to see that such programs cannot be fully software-based, as it is always possible to copy and re-execute a piece of software. Consequently, constructions for one-time programs found in the literature require tamperproof hardware, e.g., [17,20,23] or are based on trusted execution environments [32].…”
Section: Introductionmentioning
confidence: 99%