TY - JOUR
T1 - One-sided leakage-resilient privacy only two-message oblivious transfer
AU - Roy, Partha Sarathi
AU - Adhikari, Avishek
N1 - Funding Information:
Authors are supported by the National Board for Higher Mathematics, Department of Atomic Energy, Government of India (No 2/48(10)/2013/NBHM(R.P.)/R&D II/695 ). We are also thankful to the anonimous reviewers for their useful comments.
Publisher Copyright:
© 2014 Elsevier Ltd. All rights reserved.
PY - 2014
Y1 - 2014
N2 - Oblivious transfer protocol (OT) is one of the key components in various cryptographic applications. Construction of OT assumes that local secret state of honest party is perfectly hiddenfromadversary.However, recentlyone primary focus of the cryptographiccommunity is to build cryptographic tools resilient to side channel attacks. Such attacks exploit various forms of unintended information leakage which are inherent to almost all physical implementations. In this paper, we initiate a study of oblivious transfer protocol against malicious adversary in the presence of side channel attacks. Specifically, we consider a setting where a cheating sender is allowed to obtain leakage on secret state of the receiver during the protocol execution. We formalize the Definition and propose a construction of a one-sided leakageresilient privacy only two-message oblivious transfer protocol against malicious adversary. The construction is based on Naor-Pinkas (SODA-2001) two message oblivious transfer protocol. Security of the protocol is based on k-DDH assumption. The proposed protocol can tolerate a constant fraction of leakage from the memory of the receiver. To achieve the proposed Definition, we assume leak free input encoding phase in the proposed construction.
AB - Oblivious transfer protocol (OT) is one of the key components in various cryptographic applications. Construction of OT assumes that local secret state of honest party is perfectly hiddenfromadversary.However, recentlyone primary focus of the cryptographiccommunity is to build cryptographic tools resilient to side channel attacks. Such attacks exploit various forms of unintended information leakage which are inherent to almost all physical implementations. In this paper, we initiate a study of oblivious transfer protocol against malicious adversary in the presence of side channel attacks. Specifically, we consider a setting where a cheating sender is allowed to obtain leakage on secret state of the receiver during the protocol execution. We formalize the Definition and propose a construction of a one-sided leakageresilient privacy only two-message oblivious transfer protocol against malicious adversary. The construction is based on Naor-Pinkas (SODA-2001) two message oblivious transfer protocol. Security of the protocol is based on k-DDH assumption. The proposed protocol can tolerate a constant fraction of leakage from the memory of the receiver. To achieve the proposed Definition, we assume leak free input encoding phase in the proposed construction.
UR - http://www.scopus.com/inward/record.url?scp=84988273884&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84988273884&partnerID=8YFLogxK
U2 - 10.1016/j.jisa.2014.10.002
DO - 10.1016/j.jisa.2014.10.002
M3 - Article
AN - SCOPUS:84988273884
VL - 19
SP - 295
EP - 300
JO - Journal of Information Security and Applications
JF - Journal of Information Security and Applications
SN - 2214-2126
IS - 4-5
ER -