Abstract
Oblivious transfer (OT) is a fundamental primitive used in many cryptographic protocols, including general secure function evaluation (SFE) protocols. However, interaction is a primary feature of any OT protocol. In this paper, we show how to remove the interaction requirement in an OT protocol when parties participating in the protocol have access to slightly modified Trusted Platform Modules, as defined by Sarmenta et al. in proposing the notion of count-limited objects (clobs) [8]. Specifically, we construct a new cryptographic primitive called “generalized non-interactive oblivious transfer”(GNIOT). While it is possible to perform GNIOT using clobs in a straightforward manner, with multiple clobs, we show how to perform this efficiently, by using a single clob regardless of the number of values that need to be exchanged in an oblivious manner. Additionally, we provide clear definitions and a formal proof of the security of our construction. We apply this primitive to mobile agent applications and outline a new secure agent protocol called the GTX protocol which provides the same security guarantees as existing agent protocols while removing the need for interaction, thus improving efficiency.
This work is supported by the National Science Foundation under grants CNS- 0627754, CNS-0516807, CNS-061987 and CNS-0551694 . Any opinions, findings, conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abe, M., Gennaro, R., Kurosawa, K., Shoup, V.: Tag-KEM/DEM:A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 128–146. Springer, Heidelberg (2005)
Algesheimer, J., Cachin, C., Camenisch, J., Karjoth, G.: Cryptographic security for mobile code. In: Proc. of the IEEE Symposium on Security and Privacy, pp. 2–11 (2001)
Bellare, M., Micali, S.: Non-interactive oblivious transfer and applications. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 547–557. Springer, Heidelberg (1990)
Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Comput. 33(1), 167–226 (2003)
Gunupudi, V., Tate, S.R.: SAgent: A Security Framework for JADE. In: AAMAS 2006: Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems, pp. 1116–1118 (2006)
Gunupudi, V., Tate, S.R., Xu, K.: Experimental evaluation of security protocols in SAgent. In: Proceedings of the International Workshop on Privacy and Security in Agent-based Collaborative Environments (PSACE), pp. 60–74 (2006)
Rabin, M.O.: How to exchange secrets by oblivious transfer. Tech. Rep. TR-81, Harvard University (1981)
Sarmenta, L.F.G., van Dijk, M., O’Donnell, C.W., Rhodes, J., Devadas, S.: Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. In: STC 2006: Proceedings of the First ACM Workshop on Scalable Trusted Computing, pp. 27–42 (2006)
Shamir, A.: How to share a secret. Communications of the ACM 22, 11 (1979)
Strasser, M., Sevnic, P.E.: A software-based TPM emulator for Linux. Master’s thesis, Eidgenossische Technische Hochschule (ETH), Zurich, Project web page (2005), http://developer.berlios.de/projects/tpm-emulator/
Tate, S.R., Xu, K.: Mobile agent security through multi-agent cryptographic protocols. In: Proc. of the 4th International Conference on Internet Computing (IC), pp. 462–468 (2003)
Trusted Computing Group, http://www.trustedcomputinggroup.org
Trusted Computing Group. TPM main specification, version 1.2, revision 103, parts 1–3 (2007), http://www.trustedcomputinggroup.org
Xu, K., Tate, S.R.: Universally composable secure mobile agent computation. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 304–317. Springer, Heidelberg (2004)
Yao, A.: How to generate and exchange secrets. In: Proc. of the 27th IEEE Symposium on Foundations of Computer Science(FOCS), pp. 162–167 (1986)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gunupudi, V., Tate, S.R. (2008). Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents. In: Tsudik, G. (eds) Financial Cryptography and Data Security. FC 2008. Lecture Notes in Computer Science, vol 5143. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85230-8_8
Download citation
DOI: https://doi.org/10.1007/978-3-540-85230-8_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-85229-2
Online ISBN: 978-3-540-85230-8
eBook Packages: Computer ScienceComputer Science (R0)