![](/sites/default/files/styles/workshop_banner_sm_1x/public/privacy_logo_padded_0.png.jpg?itok=K6Hm3Buh)
Abstract
Hardware as a root of trust presents interesting - and intriguing - alternative to secure multi-party computations. We survey several approaches to hardware-based security, such as hardware tokens, secure elements, and secure enclaves, with application towards privacy amplification via shuffling. We conclude with open research directions and problems.