TY - GEN
T1 - Constructions of truly practical secure protocols using standard smartcards
AU - Hazay, Carmit
AU - Lindell, Yehuda
PY - 2008
Y1 - 2008
N2 - In this paper we show that using standard smartcards it is possible to construct truly practical secure protocols for a variety of tasks. Our protocols achieve full simulation-base,d security in the presence of malicious adversaries, and can be run on very large inputs. We present protocols for secure set intersection, oblivious database search and more. We have also implemented our set intersection protocol in order to show that it is truly practical: on sets of size 30,000 elements takes 20 seconds for one party and 30 minutes for the other (where the latter can be parallelized to further reduce the time). This demonstrates that in settings where physical smartcards can be sent between parties (as in the case of private data mining tasks between security and governmental agencies), it is possible to use secure protocols with proven simulation-based security.
AB - In this paper we show that using standard smartcards it is possible to construct truly practical secure protocols for a variety of tasks. Our protocols achieve full simulation-base,d security in the presence of malicious adversaries, and can be run on very large inputs. We present protocols for secure set intersection, oblivious database search and more. We have also implemented our set intersection protocol in order to show that it is truly practical: on sets of size 30,000 elements takes 20 seconds for one party and 30 minutes for the other (where the latter can be parallelized to further reduce the time). This demonstrates that in settings where physical smartcards can be sent between parties (as in the case of private data mining tasks between security and governmental agencies), it is possible to use secure protocols with proven simulation-based security.
UR - http://www.scopus.com/inward/record.url?scp=70349276910&partnerID=8YFLogxK
U2 - 10.1145/1455770.1455832
DO - 10.1145/1455770.1455832
M3 - ???researchoutput.researchoutputtypes.contributiontobookanthology.conference???
AN - SCOPUS:70349276910
SN - 9781595938107
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 491
EP - 500
BT - Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS'08
T2 - 15th ACM conference on Computer and Communications Security, CCS'08
Y2 - 27 October 2008 through 31 October 2008
ER -