One-sided leakage-resilient privacy only two-message oblivious transfer

Partha Sarathi Roy, Avishek Adhikari

Research output: Contribution to journalArticle

Abstract

Oblivious transfer protocol (OT) is one of the key components in various cryptographic applications. Construction of OT assumes that local secret state of honest party is perfectly hiddenfromadversary.However, recentlyone primary focus of the cryptographiccommunity is to build cryptographic tools resilient to side channel attacks. Such attacks exploit various forms of unintended information leakage which are inherent to almost all physical implementations. In this paper, we initiate a study of oblivious transfer protocol against malicious adversary in the presence of side channel attacks. Specifically, we consider a setting where a cheating sender is allowed to obtain leakage on secret state of the receiver during the protocol execution. We formalize the Definition and propose a construction of a one-sided leakageresilient privacy only two-message oblivious transfer protocol against malicious adversary. The construction is based on Naor-Pinkas (SODA-2001) two message oblivious transfer protocol. Security of the protocol is based on k-DDH assumption. The proposed protocol can tolerate a constant fraction of leakage from the memory of the receiver. To achieve the proposed Definition, we assume leak free input encoding phase in the proposed construction.

Original languageEnglish
Pages (from-to)295-300
Number of pages6
JournalJournal of Information Security and Applications
Volume19
Issue number4-5
DOIs
Publication statusPublished - Jan 1 2014

Fingerprint

Data storage equipment
Side channel attack

All Science Journal Classification (ASJC) codes

  • Software
  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Cite this

One-sided leakage-resilient privacy only two-message oblivious transfer. / Roy, Partha Sarathi; Adhikari, Avishek.

In: Journal of Information Security and Applications, Vol. 19, No. 4-5, 01.01.2014, p. 295-300.

Research output: Contribution to journalArticle

Roy, Partha Sarathi ; Adhikari, Avishek. / One-sided leakage-resilient privacy only two-message oblivious transfer. In: Journal of Information Security and Applications. 2014 ; Vol. 19, No. 4-5. pp. 295-300.
@article{791c60d286fb4d03afab735cb0ec22e6,
title = "One-sided leakage-resilient privacy only two-message oblivious transfer",
abstract = "Oblivious transfer protocol (OT) is one of the key components in various cryptographic applications. Construction of OT assumes that local secret state of honest party is perfectly hiddenfromadversary.However, recentlyone primary focus of the cryptographiccommunity is to build cryptographic tools resilient to side channel attacks. Such attacks exploit various forms of unintended information leakage which are inherent to almost all physical implementations. In this paper, we initiate a study of oblivious transfer protocol against malicious adversary in the presence of side channel attacks. Specifically, we consider a setting where a cheating sender is allowed to obtain leakage on secret state of the receiver during the protocol execution. We formalize the Definition and propose a construction of a one-sided leakageresilient privacy only two-message oblivious transfer protocol against malicious adversary. The construction is based on Naor-Pinkas (SODA-2001) two message oblivious transfer protocol. Security of the protocol is based on k-DDH assumption. The proposed protocol can tolerate a constant fraction of leakage from the memory of the receiver. To achieve the proposed Definition, we assume leak free input encoding phase in the proposed construction.",
author = "Roy, {Partha Sarathi} and Avishek Adhikari",
year = "2014",
month = "1",
day = "1",
doi = "10.1016/j.jisa.2014.10.002",
language = "English",
volume = "19",
pages = "295--300",
journal = "Journal of Information Security and Applications",
issn = "2214-2126",
publisher = "Elsevier Limited",
number = "4-5",

}

TY - JOUR

T1 - One-sided leakage-resilient privacy only two-message oblivious transfer

AU - Roy, Partha Sarathi

AU - Adhikari, Avishek

PY - 2014/1/1

Y1 - 2014/1/1

N2 - Oblivious transfer protocol (OT) is one of the key components in various cryptographic applications. Construction of OT assumes that local secret state of honest party is perfectly hiddenfromadversary.However, recentlyone primary focus of the cryptographiccommunity is to build cryptographic tools resilient to side channel attacks. Such attacks exploit various forms of unintended information leakage which are inherent to almost all physical implementations. In this paper, we initiate a study of oblivious transfer protocol against malicious adversary in the presence of side channel attacks. Specifically, we consider a setting where a cheating sender is allowed to obtain leakage on secret state of the receiver during the protocol execution. We formalize the Definition and propose a construction of a one-sided leakageresilient privacy only two-message oblivious transfer protocol against malicious adversary. The construction is based on Naor-Pinkas (SODA-2001) two message oblivious transfer protocol. Security of the protocol is based on k-DDH assumption. The proposed protocol can tolerate a constant fraction of leakage from the memory of the receiver. To achieve the proposed Definition, we assume leak free input encoding phase in the proposed construction.

AB - Oblivious transfer protocol (OT) is one of the key components in various cryptographic applications. Construction of OT assumes that local secret state of honest party is perfectly hiddenfromadversary.However, recentlyone primary focus of the cryptographiccommunity is to build cryptographic tools resilient to side channel attacks. Such attacks exploit various forms of unintended information leakage which are inherent to almost all physical implementations. In this paper, we initiate a study of oblivious transfer protocol against malicious adversary in the presence of side channel attacks. Specifically, we consider a setting where a cheating sender is allowed to obtain leakage on secret state of the receiver during the protocol execution. We formalize the Definition and propose a construction of a one-sided leakageresilient privacy only two-message oblivious transfer protocol against malicious adversary. The construction is based on Naor-Pinkas (SODA-2001) two message oblivious transfer protocol. Security of the protocol is based on k-DDH assumption. The proposed protocol can tolerate a constant fraction of leakage from the memory of the receiver. To achieve the proposed Definition, we assume leak free input encoding phase in the proposed construction.

UR - http://www.scopus.com/inward/record.url?scp=84988273884&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84988273884&partnerID=8YFLogxK

U2 - 10.1016/j.jisa.2014.10.002

DO - 10.1016/j.jisa.2014.10.002

M3 - Article

AN - SCOPUS:84988273884

VL - 19

SP - 295

EP - 300

JO - Journal of Information Security and Applications

JF - Journal of Information Security and Applications

SN - 2214-2126

IS - 4-5

ER -