Abstract

Hardware as a root of trust presents interesting - and intriguing - alternative to secure multi-party computations. We survey several approaches to hardware-based security, such as hardware tokens, secure elements, and secure enclaves, with application towards privacy amplification via shuffling. We conclude with open research directions and problems.

Video Recording