Oblivious transfer in the bounded storage model with errors

Rafael Dowsley, Felipe Lacerda, Anderson C.A. Nascimento

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

Abstract

In the bounded storage model the memory of the adversarial parties is restricted, instead of their computational power. This different restriction allows the construction of protocols with information-theoretical (instead of only computational) security. We present the first protocol for oblivious transfer in the bounded storage model with errors, i.e., where the public random sources available to the two parties are not exactly the same, but instead are only required to have a small Hamming distance between themselves, and the memory of the (adversarial) receiver is limited. Oblivious transfer protocols were known previously only for the error-free variant of the bounded storage model, which is harder to realize.

Original languageEnglish
Title of host publication2014 IEEE International Symposium on Information Theory, ISIT 2014
EditorsSae-Young Chung, Gerhard Kramer, Olgica Milenkovic, Urbashi Mitra
Place of PublicationPiscataway NJ USA
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages1623-1627
Number of pages5
ISBN (Electronic)9781479951864
DOIs
Publication statusPublished - 2014
Externally publishedYes
EventIEEE International Symposium on Information Theory 2014 - Honolulu , United States of America
Duration: 29 Jun 20144 Jul 2014
http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6867217 (Proceedings)

Publication series

NameIEEE International Symposium on Information Theory - Proceedings
PublisherIEEE, Institute of Electrical and Electronics Engineers
ISSN (Print)2157-8095

Conference

ConferenceIEEE International Symposium on Information Theory 2014
Abbreviated titleISIT 2014
Country/TerritoryUnited States of America
CityHonolulu
Period29/06/144/07/14
Internet address

Cite this