link

March 5, Wednesday
12:00 – 14:00

Efficient Protocols in the Presence of Covert and Malicious Adversaries.
Students seminar
Lecturer : Mrs. Carmit Hazay
Lecturer homepage : http://www.cs.biu.ac.il/~harelc
Affiliation : Department of Computer Science, Bar Ilan University
Location : 202/37
Host : Student Seminar
In this talk we present efficient secure protocols for a variety of tasks, including oblivious transfer, set intersection and pattern matching. Our protocols for securely computing the set intersection functionality are based on secure pseudorandom function evaluations, in contrast to previous protocols that used secure polynomial evaluation. We also use secure pseudorandom function evaluation in order to achieve secure pattern matching. In this case, we utilize specific properties of the Naor-Reingold pseudorandom function in order to achieve high efficiency. Finally, we show that using standard smartcards it is possible to construct truly practical secure protocols, and demonstrate this on the problem of set intersection. We consider a variety of adversary models and definitions of security in our results. Some of our protocols are secure in the presence of malicious adversaries with full simulation (via the ideal/real paradigm), and some provide only privacy. We also present protocols that are secure in the presence of covert adversaries. Loosely speaking, this means that a malicious adversary can cheat, but will then be caught with good probability