Implementing information-theoretically secure oblivious transfer from packet reordering

dc.contributor.authorPalmieri, Paolo
dc.contributor.authorPereira, Olivier
dc.contributor.editorKim, Howon
dc.contributor.funderFonds De La Recherche Scientifique - FNRSen
dc.contributor.funderUniversité Catholique de Louvainen
dc.date.accessioned2017-09-22T10:47:41Z
dc.date.available2017-09-22T10:47:41Z
dc.date.issued2011-12
dc.date.updated2017-09-20T16:08:55Z
dc.description.abstractIf we assume that adversaries have unlimited computational capabilities, secure computation between mutually distrusting players can not be achieved using an error-free communication medium. However, secure multi-party computation becomes possible when a noisy channel is available to the parties. For instance, the Binary Symmetric Channel (BSC) has been used to implement Oblivious Transfer (OT), a fundamental primitive in secure multi-party computation. Current research is aimed at designing protocols based on real-world noise sources, in order to make the actual use of information-theoretically secure computation a more realistic prospect for the future. In this paper, we introduce a modified version of the recently proposed Binary Discrete-time Delaying Channel (BDDC), a noisy channel based on communication delays. We call our variant Reordering Channel (RC), and we show that it successfully models packet reordering, the common behavior of packet switching networks that results in the reordering of the packets in a stream during their transit over the network. We also show that the protocol implementing oblivious transfer on the BDDC can be adapted to the new channel by using a different sending strategy, and we provide a functioning implementation of this modified protocol. Finally, we present strong experimental evidence that reordering occurrences between two remote Internet hosts are enough for our construction to achieve statistical security against honest-but-curious adversaries.en
dc.description.sponsorshipFonds De La Recherche Scientifique - FNRS (F.R.S.-FNRS); Université Catholique de Louvain (SCOOP Action de Recherche Concertées)en
dc.description.statusPeer revieweden
dc.description.versionAccepted Versionen
dc.format.mimetypeapplication/pdfen
dc.identifier.citationPalmieri, P. and Pereira, O. (2012) 'Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering', in Kim, H. (ed.) Information Security and Cryptology - ICISC 2011: 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 332-345, doi: 10.1007/978-3-642-31912-9_22en
dc.identifier.doi10.1007/978-3-642-31912-9_22
dc.identifier.endpage345en
dc.identifier.isbn978-3-642-31912-9
dc.identifier.journaltitleInformation Security and Cryptology - ICISC 2011: 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papersen
dc.identifier.startpage332en
dc.identifier.urihttps://hdl.handle.net/10468/4773
dc.language.isoenen
dc.publisherSpringer Berlin Heidelbergen
dc.relation.ispartofInformation Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers
dc.relation.urihttps://link.springer.com/chapter/10.1007/978-3-642-31912-9_22
dc.rights© Springer-Verlag Berlin Heidelberg 2012. The final publication is available at Springer via https://doi.org/10.1007/978-3-642-31912-9_22en
dc.subjectOblivious transferen
dc.subjectSecure multi-party computationen
dc.subjectNoisy channelsen
dc.subjectPacket reorderingen
dc.subjectDelayen
dc.titleImplementing information-theoretically secure oblivious transfer from packet reorderingen
dc.typeConference itemen
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Palmieri_Pereira_ICISC2011.pdf
Size:
387.8 KB
Format:
Adobe Portable Document Format
Description:
Accepted version
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.71 KB
Format:
Item-specific license agreed upon to submission
Description: