Constant Round Oblivious Transfer in the Bounded

Foundations of Cryptography
Lecture 7
Lecturer:Danny Harnik
Maurer’s Bounded Storage
Model




Most Cryptographic tasks are only possible
when parties are known to be bounded.
“Mainstream Cryptography”: Assume parties
are time bounded (run in polynomial time).
Maurer’s model: Assume parties have
bounded storage.
Remark: Bounded Storage ≠ Bounded Space.

Measures only the storage capacity at one point of
the process.
The bounded storage model:
The setting

A long random string R
is transmitted.

Honest parties store
small portions of R.

Parties interact.

Protocol is secure even
against dishonest
parties which store
almost all of R.
½ length N
A long
random
Stores
string
bits
RNof
Stores
N½ ¾N
Stores
Alice
Bob
Malicious party
(Arbitrary function of R)
Example: Key-Agreement
Alice and Bob interact
over a public channel
(with no initial secret
key).
They want to agree on a
secret key.
public channel
Alice
Bob
key
key
Eavesdropper
??
Protocol: Key-Agreement
[CM97]

A long random string R is
transmitted.

Alice and Bob store random
subsets of size ~N½.


A long random
string
key
Stores
Stores
N½R of
N½length N
Alice
Bob
Send position of subsets and
agree on content of
intersection.
Next, we show that an
eavesdropper which stores
¾N bits has a lot of entropy
on the key.
Eavesdropper
Does not know the key!
The view of the adversary




¾N bits
key
Simplifying assumption:
The adversary stores a
¾ known random set
¼ unknown
subset bits of R of size
¾N.
The sets chosen by the
From my point of view
players are random.
the key is a highentropy source!
The set which defines the
key is a random set.
The adversary does not
Eavesdropper
remember ~ ¼N bits.
* This holds even when the adversary stores an arbitrary
function of R [NZ93].
Randomness Extractors [NZ93]




Extract randomness from
arbitrary distributions
which contain sufficient
(min)-entropy.
Use a short seed of truly
random bits.
Output is (close to)
uniform even when the
adversary knows the seed.
Relation to BSM pointed
out by [Lu02,Vad03]
high entropy distribution
Extractor
random output
seed
Key-Agreement using
extractors

A long random string R is
transmitted.

Alice and Bob store random
subsets of size ~N½.


A long random
string
Stores
Stores
N½R of
N½length N
Alice
Bob
Send position of subsets and
agree on content of
intersection.
Alice randomly chooses a
seed and sends it to Bob.
Both apply an extractor To
receive the key.
Extractor
random key
seed
Further Improvements

Instead of random subsets, Alice & Bob
remember pairwise independent locations




Eavesdropper still has high min-entropy [NZ].
Saves communication when finding the
intersection of both sides.
Can further use better “Samplers” to choose
these locations.
Only need to send seed to the sampler in
order to agree on intersection.
The Secret Key Setting


Seed to sampler is used as the secret key.
Alice & Bob only store the bits at the locations the
sampler chooses.




Can use small set for Alice and Bob.
For the Eavesdropper this set is a high min-entropy
source.
By applying extractor, receive a long key that is close
to uniform from Eavesdropper’s point of view.
Best result so far for message of length m [Vad03]:


Alice & Bob store only O(m + log 1/ ε )
Secret Key length: O(log N + log 1/ ε )
The bounded storage model


Practical? Depends on ratio between price of memory
and speed of broadcast.
Most of the research so far focused on:


Key agreement [Mau93,CM97].
Secret-key encryption
[Mau93,CM97,AR99,ADR02,DR02,DM02,Lu02,Vad03].
Advantages:
 Clean model.
 Security does not require unproven assumptions.
 Everlasting security: The security is guaranteed even
if at a later stage the adversary gains more memory.