Abstract
In this chapter, we present protocols for securely computing any functionality in the model of covert adversaries; see Section 2.4 for motivation and definitions of the model. We begin by presenting a protocol for oblivious transfer that is secure in the covert model. We present this protocol mainly for didactic reasons; it serves as a good warm-up for understanding how to prove security in this model. Nevertheless, we stress that more efficient oblivious transfer protocols are known (both for the covert and malicious settings; see Section 7.4 for an example).
| Original language | English |
|---|---|
| Title of host publication | Information Security and Cryptography |
| Publisher | Springer International Publishing |
| Pages | 109-143 |
| Number of pages | 35 |
| DOIs | |
| State | Published - 2010 |
Publication series
| Name | Information Security and Cryptography |
|---|---|
| Volume | 15 |
| ISSN (Print) | 1619-7100 |
| ISSN (Electronic) | 2197-845X |
Bibliographical note
Publisher Copyright:© 2010, Springer-Verlag Berlin Heidelberg.