dc.contributor.author | Canetti, Ran | |
dc.contributor.author | Cheung, Ling | |
dc.contributor.author | Kaynar, Dilsun | |
dc.contributor.author | Liskov, Moses | |
dc.contributor.author | Lynch, Nancy | |
dc.contributor.author | Olivier | |
dc.contributor.author | Segala, Roberto | |
dc.contributor.other | Theory of Distributed Systems | |
dc.date.accessioned | 2005-12-22T02:36:36Z | |
dc.date.available | 2005-12-22T02:36:36Z | |
dc.date.issued | 2005-08-19 | |
dc.identifier.other | MIT-CSAIL-TR-2005-055 | |
dc.identifier.other | MIT-LCS-TR-1001 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/30566 | |
dc.description.abstract | We demonstrate how to carry out cryptographic security analysis ofdistributed protocols within the Probabilistic I/O Automata frameworkof Lynch, Segala, and Vaandrager.This framework provides tools for arguing rigorously about theconcurrency and scheduling aspects of protocols, and about protocolspresented at different levels of abstraction.Consequently, it can help in making cryptographic analysis moreprecise and less susceptible to errors.We concentrate on a relatively simple two-party Oblivious Transferprotocol, in the presence of a semi-honest adversary (essentially, aneavesdropper).For the underlying cryptographic notion of security, we use a versionof Canetti's Universally Composable security.In spite of the relative simplicity of the example, the exercise isquite nontrivial.It requires taking many fundamental issues into account,including nondeterministic behavior, scheduling, resource-boundedcomputation, and computational hardness assumptions for cryptographicprimitives. | |
dc.format.extent | 123 p. | |
dc.format.extent | 130601890 bytes | |
dc.format.extent | 5801647 bytes | |
dc.format.mimetype | application/postscript | |
dc.format.mimetype | application/pdf | |
dc.language.iso | en_US | |
dc.relation.ispartofseries | Massachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory | |
dc.relation.isreplacedby | http://hdl.handle.net/1721.1/33154 | |
dc.relation.uri | http://hdl.handle.net/1721.1/33154 | |
dc.title | Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol | |