Public Verifiability in the Covert Model (Almost) for Free

نویسندگان

  • Vladimir Kolesnikov
  • Alex J. Malozemoff
چکیده

The covert security model (Aumann and Lindell, TCC 2007) offers an important security/efficiency trade-off: a covert player may arbitrarily cheat, but is caught with a certain fixed probability. This permits more efficient protocols than the malicious setting while still giving meaningful security guarantees. However, one drawback is that cheating cannot be proven to a third party, which prevents the use of covert protocols in many practical settings. Recently, Asharov and Orlandi (ASIACRYPT 2012) enhanced the covert model by allowing the honest player to generate a proof of cheating, checkable by any third party. Their model, which we call the PVC (publicly verifiable covert) model, offers a very compelling trade-off. Asharov and Orlandi (AO) propose a practical protocol in the PVC model, which, however, relies on a specific expensive oblivious transfer (OT) protocol incompatible with OT extension. In this work, we improve the performance of the PVC model by constructing a PVC-compatible OT extension as well as making several practical improvements to the AO protocol. As compared to the state-of-the-art OT extension-based two-party covert protocol, our PVC protocol adds relatively little: four signatures and an ≈ 67% wider OT extension matrix. This is a significant improvement over the AO protocol, which requires public-key-based OTs per input bit. We present detailed estimates showing (up to orders of magnitude) concrete performance improvements over the AO protocol and a recent malicious protocol.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Calling Out Cheaters: Covert Security with Public Verifiability

We introduce the notion of covert security with public verifiability, building on the covert security model introduced by Aumann and Lindell (TCC 2007). Protocols that satisfy covert security guarantee that the honest parties involved in the protocol will notice any cheating attempt with some constant probability . The idea behind the model is that the fear of being caught cheating will be enou...

متن کامل

The Effect of motivational covert and overt self-talk on basketball free throw skill learning in adults

The purpose of this study was to evaluate the effect of motivational covert and overt self-talk on basketball free throw skill learning in adults. 60 students of Gorgan Islamic Azad University based on pretest scores randomly assigned in three equal groups (n1=n2=n3=20). Participants in motivational covert and overt self-talk conducted basketball shooting skill acquisition in 12 sessions (each ...

متن کامل

Ethical Virtue in Services Organizations of Iran

Background: Ethical organizational culture is a subset of the broader organizational culture that incorporates shared ethical values among the employees of an organization and is maintained through formal and informal organizational systems, thereby creating and maintaining ethical organizational culture. And strengthening it is important for organizations. The purpose of this study was to inve...

متن کامل

Not Up for Discussion: Applying Lukes’ Power Model to the Study of Health System Corruption; Comment on “We Need to Talk About Corruption in Health Systems”

This companion paper suggests the potential benefits of applying Steven Lukes’ dimensions of power model to the study of corruption in health systems. Lukes’ model sets out three “faces of power” classified by their influence on political discourse, resulting in overt, covert and latent discussion of issues depending on the degree of their alignment with the agenda of d...

متن کامل

COVERT Based Algorithms for Solving the Generalized Tardiness Flow Shop Problems

Four heuristic algorithms are developed for solving the generalized version of tardiness flow shop problems. We consider the generalized tardiness flow shop model with minimization of the total tardiness as its performance measure. We modify the concept of cost over time (COVERT) for the generalized version of the flow shop tardiness model and employ this concept for developing four algorithms....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015