Show simple item record

Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol

dc.date.accessioned2006-06-19T18:52:04Z
dc.date.accessioned2018-11-24T10:24:56Z
dc.date.available2006-06-19T18:52:04Z
dc.date.available2018-11-24T10:24:56Z
dc.date.issued2006-06-19
dc.identifier.citationJanuary 10, 2006
dc.identifier.urihttp://hdl.handle.net/1721.1/33154
dc.identifier.urihttp://repository.aust.edu.ng/xmlui/handle/1721.1/33154
dc.description.abstractWe demonstrate how to carry out cryptographic security analysis ofdistributed protocols within the Probabilistic I/O Automataframework of Lynch, Segala, and Vaandrager. This framework providestools for arguing rigorously about the concurrency and schedulingaspects of protocols, and about protocols presented at differentlevels of abstraction. Consequently, it can help in makingcryptographic analysis more precise and less susceptible to errors.We concentrate on a relatively simple two-party Oblivious Transferprotocol, in the presence of a semi-honest adversary (essentially,an eavesdropper). For the underlying cryptographic notion ofsecurity, we use a version of Canetti's Universally Composablesecurity.In spite of the relative simplicity of the example, the exercise isquite nontrivial. It requires taking many fundamental issues intoaccount, including nondeterministic behavior, scheduling,resource-bounded computation, and computational hardness assumptionsfor cryptographic primitives.
dc.format.extent129 p.
dc.format.extent1111678 bytes
dc.format.extent7337435 bytes
dc.language.isoen_US
dc.relation.replaceshttp://hdl.handle.net/1721.1/30566
dc.relation.urihttp://hdl.handle.net/1721.1/30566
dc.titleUsing Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol


Files in this item

FilesSizeFormatView
MIT-CSAIL-TR-2006-046.pdf1.111Mbapplication/pdfView/Open
MIT-CSAIL-TR-2006-046.ps7.337Mbapplication/postscriptView/Open

This item appears in the following Collection(s)

Show simple item record