18.11.2014 Views

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Let f an i<strong>de</strong>al oblivious transfer functionality and let B = (B 1 , B 2 ) <strong>de</strong>note<br />

an admissible pair (i.e. at least one of the parties is honest) of non-uniform probabilistic<br />

expected polynomial-time machines (representing parties in the i<strong>de</strong>al mo<strong>de</strong>l).<br />

The joint execution of f un<strong>de</strong>r B in the i<strong>de</strong>al mo<strong>de</strong>l on inputs ((b 0 , b 1 ), σ), <strong>de</strong>noted by<br />

IDEAL f,B ((b 0 , b 1 ), σ), is <strong>de</strong>fined as the resulting output pair and protocol transcript obtained<br />

by B 1 and B 2 after the i<strong>de</strong>al execution.<br />

Real Mo<strong>de</strong>l Execution. for this execution, no trusted party is available and the parties<br />

interact directly. A corrupted party may adopt any arbitrary strategy implementable by<br />

non-uniform PPT machines. Let π <strong>de</strong>note a two-party protocol and let A = (A 1 , A 2 )<br />

<strong>de</strong>note a pair of non-uniform PPT machines (representing parties in the real mo<strong>de</strong>l).<br />

The joint execution of π un<strong>de</strong>r A in the real mo<strong>de</strong>l on inputs ((b 0 , b 1 ), σ), <strong>de</strong>noted by<br />

REAL π,A ((b 0 , b 1 ), σ), is <strong>de</strong>fined as the resulting output pair and protocol transcript obtained<br />

by A 1 and A 2 after the protocol execution.<br />

Adversarial Mo<strong>de</strong>l. In this paper, we consi<strong>de</strong>r the malicious adversarial mo<strong>de</strong>l, where<br />

a dishonest party may arbitrarily disrupt the protocol execution (for instance, a malicious<br />

party is allowed to <strong>de</strong>viate from the protocol). Additionally, we assume the static corruption<br />

mo<strong>de</strong>l, where parties have fixed a behavior throughout protocol execution.<br />

Enlightened by the previous <strong>de</strong>finitions, we can now formalize the notion of securely<br />

implementing an OT protocol in the simulation-based paradigm.<br />

Definition 1. Consi<strong>de</strong>r an i<strong>de</strong>al OT functionality f and a two-party protocol π in the real<br />

mo<strong>de</strong>l. The protocol π is said to securely implement an OT protocol if for every pair of<br />

admissible non-uniform PPT machines A = (A 1 , A 2 ) for the real mo<strong>de</strong>l, there exists<br />

a pair of admissible non-uniform probabilistic expected polynomial-time machines B =<br />

(B 1 , B 2 ) for the i<strong>de</strong>al mo<strong>de</strong>l, such that for every b 0 , b 1 ∈ {0, 1} and every σ ∈ {0, 1},<br />

{<br />

}<br />

IDEAL f,B (n, (b 0 , b 1 ), σ) ≡ c REAL π,A (n, (b 0 , b 1 ), σ)<br />

In or<strong>de</strong>r to achieve constant-round protocols it is necessary to allow the i<strong>de</strong>al adversary<br />

and simulators to run in expected polynomial time [Barak and Lin<strong>de</strong>ll 2004].<br />

3. Lossy Encryption<br />

Lossy encryption [Hemenway et al. 2009, Bellare et al. 2009] expands on the <strong>de</strong>finition<br />

of Dual Mo<strong>de</strong> Encryption [Peikert et al. 2008], a type of cryptosystem with two types of<br />

public keys, which specify two mo<strong>de</strong>s of operation: a messy mo<strong>de</strong> and a <strong>de</strong>cryption mo<strong>de</strong>.<br />

In the <strong>de</strong>cryption mo<strong>de</strong>, the cryptosystem behaves normally and it is possible to <strong>de</strong>crypt a<br />

message encrypted with a given public key using the corresponding secret key. However,<br />

in the messy mo<strong>de</strong>, the encrypted information is statistically lost.<br />

A lossy cryptosystem is <strong>de</strong>fined as a type of cryptosystem with two types of public<br />

keys, injective and lossy keys, which specify different results of encryption. If injective<br />

keys are used, the cryptosystem behaves regularly (correctly <strong>de</strong>crypting ciphertexts with<br />

the right secret key) while in the lossy mo<strong>de</strong>, the ciphertexts generated by the encryption<br />

algorithm are in<strong>de</strong>pen<strong>de</strong>nt from the plaintext messages,causing information to be statistically<br />

lost. It is also required that lossy keys are indistinguishable from injective keys by<br />

efficient adversaries.<br />

111

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!