Oblivious transfer with a memory-bounded receiver

被引:58
|
作者
Cachin, C [1 ]
Crepeau, C [1 ]
Marcil, J [1 ]
机构
[1] MIT, Comp Sci Lab, Cambridge, MA 02139 USA
来源
39TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS | 1998年
关键词
D O I
10.1109/SFCS.1998.743500
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We propose a protocol for oblivious transfer that is unconditionally secure under the sole assumption that the memory size of the receiver is bounded. The model assumes that a random bit string slightly larger than the receiver's memory is broadcast (either by the sender or by a third party). In our construction, both parties need memory of size in theta(n(2-2 alpha)) for some alpha < 1/2, when a random string of size N = n(2-alpha-beta) is broadcast, for alpha > beta > 0, whereas a malicious receiver carl have up to gamma N bits of memory for ang gamma < 1. In the course of our analysis, we provide a direct study of an interactive hashing protocol closely related to that of Naor et al. [27].
引用
收藏
页码:493 / 502
页数:4
相关论文
共 50 条
  • [1] SCALABLE PROBLEMS AND MEMORY-BOUNDED SPEEDUP
    SUN, XH
    NI, LM
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 1993, 19 (01) : 27 - 37
  • [2] Stochastic node caching for memory-bounded search
    Miura, T
    Ishida, T
    FIFTEENTH NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AAAI-98) AND TENTH CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICAL INTELLIGENCE (IAAI-98) - PROCEEDINGS, 1998, : 450 - 456
  • [3] Multiagent learning in the presence of memory-bounded agents
    Chakraborty, Doran
    Stone, Peter
    AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS, 2014, 28 (02) : 182 - 213
  • [4] Stochastic node caching for memory-bounded search
    Miura, Teruhisa
    Ishida, Toru
    Systems and Computers in Japan, 1999, 30 (02) : 57 - 65
  • [5] Multiagent learning in the presence of memory-bounded agents
    Doran Chakraborty
    Peter Stone
    Autonomous Agents and Multi-Agent Systems, 2014, 28 : 182 - 213
  • [6] Unconditional security against memory-bounded adversaries
    Cachin, C
    Maurer, U
    ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 292 - 306
  • [7] The Memory-Bounded Speedup Model and Its Impacts in Computing
    Xian-He Sun
    Xiaoyang Lu
    Journal of Computer Science and Technology, 2023, 38 : 64 - 79
  • [8] Information-Theoretic Interactive Hashing and Oblivious Transfer to a Storage-Bounded Receiver
    Cachin, Christian
    Crepeau, Claude
    Marcil, Julien
    Savvides, George
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (10) : 5623 - 5635
  • [9] Memory-Bounded Dynamic Programming for DEC-POMDPs
    Seuken, Sven
    Zilberstein, Shlomo
    20TH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2007, : 2009 - 2015
  • [10] Memory-bounded Neural Incremental Parsing for Psycholinguistic Prediction
    Jin, Lifeng
    Schuler, William
    16TH INTERNATIONAL CONFERENCE ON PARSING TECHNOLOGIES AND IWPT 2020 SHARED TASK ON PARSING INTO ENHANCED UNIVERSAL DEPENDENCIES, 2020, : 48 - 61