Palmieri, P. and Pereira, O., 2012. Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering. In: Information Security and Cryptology - 14th International Conference (ICISC 2011), 30 November --2 December 2011, Seoul, Korea, 332 - 345 .
Full text available as:
|
PDF
Palmieri_Pereira_ICISC2011.pdf - Accepted Version 394kB | |
Copyright to original material in this document is with the original owner(s). Access to this content through BURO is granted on condition that you use it only for research, scholarly or other non-commercial purposes. If you wish to use it for any other purposes, you must contact BU via BURO@bournemouth.ac.uk. Any third party copyright material in this document remains the property of its respective owner(s). BU grants no licence for further use of that third party material. |
DOI: 10.1007/978-3-642-31912-9_22
Abstract
If we assume that adversaries have unlimited computational capabilities, secure computation between mutually distrusting players can not be achieved using an error-free communication medium. However, secure multi-party computation becomes possible when a noisy channel is available to the parties. For instance, the Binary Symmetric Channel (BSC) has been used to implement Oblivious Transfer (OT), a fundamental primitive in secure multi-party computation. Current research is aimed at designing protocols based on real-world noise sources, in order to make the actual use of information-theoretically secure computation a more realistic prospect for the future. In this paper, we introduce a modified version of the recently proposed Binary Discrete-time Delaying Channel (BDDC), a noisy channel based on communication delays. We call our variant Reordering Channel (RC), and we show that it successfully models packet reordering, the common behavior of packet switching networks that results in the reordering of the packets in a stream during their transit over the network. We also show that the protocol implementing oblivious transfer on the BDDC can be adapted to the new channel by using a different sending strategy, and we provide a functioning implementation of this modified protocol. Finally, we present strong experimental evidence that reordering occurrences between two remote Internet hosts are enough for our construction to achieve statistical security against honest-but-curious adversaries.
Item Type: | Conference or Workshop Item (Paper) |
---|---|
ISSN: | 0302-9743 |
Additional Information: | Lecture Notes in Computer Science Volume 7259, 2012, pp 332-345 |
Uncontrolled Keywords: | Oblivious transfer ; secure multi-party computation ; noisy channels ; packet reordering ; delay |
Group: | Faculty of Science & Technology |
ID Code: | 22161 |
Deposited By: | Symplectic RT2 |
Deposited On: | 06 Jul 2015 13:11 |
Last Modified: | 14 Mar 2022 13:51 |
Downloads
Downloads per month over past year
Repository Staff Only - |