Covert adversaries

Carmit Hazay, Yehuda Lindell

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

In this chapter, we present protocols for securely computing any functionality in the model of covert adversaries; see Section 2.4 for motivation and definitions of the model. We begin by presenting a protocol for oblivious transfer that is secure in the covert model. We present this protocol mainly for didactic reasons; it serves as a good warm-up for understanding how to prove security in this model. Nevertheless, we stress that more efficient oblivious transfer protocols are known (both for the covert and malicious settings; see Section 7.4 for an example).

Original languageEnglish
Title of host publicationInformation Security and Cryptography
PublisherSpringer International Publishing
Pages109-143
Number of pages35
DOIs
StatePublished - 2010

Publication series

NameInformation Security and Cryptography
Volume15
ISSN (Print)1619-7100
ISSN (Electronic)2197-845X

Bibliographical note

Publisher Copyright:
© 2010, Springer-Verlag Berlin Heidelberg.

Fingerprint

Dive into the research topics of 'Covert adversaries'. Together they form a unique fingerprint.

Cite this