Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol

We demonstrate how to carry out cryptographic security analysis ofdistributed protocols within the Probabilistic I/O Automataframework of Lynch, Segala, and Vaandrager. This framework providestools for arguing rigorously about the concurrency and schedulingaspects of protocols, and about protocols p...

Full description

Bibliographic Details
Main Authors: Canetti, Ran, Cheung, Ling, Kaynar, Dilsun, Liskov, Moses, Lynch, Nancy, Pereira, Olivier, Segala, Roberto
Other Authors: Nancy Lynch
Language:en_US
Published: 2006
Online Access:http://hdl.handle.net/1721.1/33154
_version_ 1826196935162200064
author Canetti, Ran
Cheung, Ling
Kaynar, Dilsun
Liskov, Moses
Lynch, Nancy
Pereira, Olivier
Segala, Roberto
author2 Nancy Lynch
author_facet Nancy Lynch
Canetti, Ran
Cheung, Ling
Kaynar, Dilsun
Liskov, Moses
Lynch, Nancy
Pereira, Olivier
Segala, Roberto
author_sort Canetti, Ran
collection MIT
description We demonstrate how to carry out cryptographic security analysis ofdistributed protocols within the Probabilistic I/O Automataframework of Lynch, Segala, and Vaandrager. This framework providestools for arguing rigorously about the concurrency and schedulingaspects of protocols, and about protocols presented at differentlevels of abstraction. Consequently, it can help in makingcryptographic analysis more precise and less susceptible to errors.We concentrate on a relatively simple two-party Oblivious Transferprotocol, in the presence of a semi-honest adversary (essentially,an eavesdropper). For the underlying cryptographic notion ofsecurity, we use a version of Canetti's Universally Composablesecurity.In spite of the relative simplicity of the example, the exercise isquite nontrivial. It requires taking many fundamental issues intoaccount, including nondeterministic behavior, scheduling,resource-bounded computation, and computational hardness assumptionsfor cryptographic primitives.
first_indexed 2024-09-23T10:40:18Z
id mit-1721.1/33154
institution Massachusetts Institute of Technology
language en_US
last_indexed 2024-09-23T10:40:18Z
publishDate 2006
record_format dspace
spelling mit-1721.1/331542019-04-12T08:35:56Z Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol Canetti, Ran Cheung, Ling Kaynar, Dilsun Liskov, Moses Lynch, Nancy Pereira, Olivier Segala, Roberto Nancy Lynch Theory of Computation We demonstrate how to carry out cryptographic security analysis ofdistributed protocols within the Probabilistic I/O Automataframework of Lynch, Segala, and Vaandrager. This framework providestools for arguing rigorously about the concurrency and schedulingaspects of protocols, and about protocols presented at differentlevels of abstraction. Consequently, it can help in makingcryptographic analysis more precise and less susceptible to errors.We concentrate on a relatively simple two-party Oblivious Transferprotocol, in the presence of a semi-honest adversary (essentially,an eavesdropper). For the underlying cryptographic notion ofsecurity, we use a version of Canetti's Universally Composablesecurity.In spite of the relative simplicity of the example, the exercise isquite nontrivial. It requires taking many fundamental issues intoaccount, including nondeterministic behavior, scheduling,resource-bounded computation, and computational hardness assumptionsfor cryptographic primitives. 2006-06-19T18:52:04Z 2006-06-19T18:52:04Z 2006-06-19 MIT-CSAIL-TR-2006-046 http://hdl.handle.net/1721.1/33154 January 10, 2006 en_US Massachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory http://hdl.handle.net/1721.1/30566 http://hdl.handle.net/1721.1/30566 129 p. 1111678 bytes 7337435 bytes application/pdf application/postscript application/pdf application/postscript
spellingShingle Canetti, Ran
Cheung, Ling
Kaynar, Dilsun
Liskov, Moses
Lynch, Nancy
Pereira, Olivier
Segala, Roberto
Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
title Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
title_full Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
title_fullStr Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
title_full_unstemmed Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
title_short Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol
title_sort using probabilistic i o automata to analyze an oblivious transfer protocol
url http://hdl.handle.net/1721.1/33154
work_keys_str_mv AT canettiran usingprobabilisticioautomatatoanalyzeanoblivioustransferprotocol
AT cheungling usingprobabilisticioautomatatoanalyzeanoblivioustransferprotocol
AT kaynardilsun usingprobabilisticioautomatatoanalyzeanoblivioustransferprotocol
AT liskovmoses usingprobabilisticioautomatatoanalyzeanoblivioustransferprotocol
AT lynchnancy usingprobabilisticioautomatatoanalyzeanoblivioustransferprotocol
AT pereiraolivier usingprobabilisticioautomatatoanalyzeanoblivioustransferprotocol
AT segalaroberto usingprobabilisticioautomatatoanalyzeanoblivioustransferprotocol