Scheduled Maintenance on Saturday, October 24, 2015
IEEE Xplore will be unavailable from 9:00 AM - 12:00 noon ET (13:00 - 16:00 UTC).
Single article sales and account management will be unavailable from 5:00 AM - 7:00 PM ET (09:00 - 23:00 UTC). We apologize for the inconvenience.
By Topic

Oblivious transfer in the bounded storage model with errors

Sign In

Full text access may be available.

To access full text, please use your member or institutional sign in.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Dowsley, R. ; Inst. of Theor. Inf., Karlsruhe Inst. of Technol., Karlsruhe, Germany ; Lacerda, F. ; Nascimento, A.C.A.

In the bounded storage model the memory of the adversarial parties is restricted, instead of their computational power. This different restriction allows the construction of protocols with information-theoretical (instead of only computational) security. We present the first protocol for oblivious transfer in the bounded storage model with errors, i.e., where the public random sources available to the two parties are not exactly the same, but instead are only required to have a small Hamming distance between themselves, and the memory of the (adversarial) receiver is limited. Oblivious transfer protocols were known previously only for the error-free variant of the bounded storage model, which is harder to realize.

Published in:

Information Theory (ISIT), 2014 IEEE International Symposium on

Date of Conference:

June 29 2014-July 4 2014