DocumentCode
2913635
Title
Cryptography from Anonymity
Author
Ishai, Yuval ; Kushilevitz, Eyal ; Ostrovsky, Rafail ; Sahai, Amit
Author_Institution
Dept. of Comput. Sci., Technion-Israel Inst. of Technol., Haifa
fYear
2006
fDate
Oct. 2006
Firstpage
239
Lastpage
248
Abstract
There is a vast body of work on implementing anonymous communication. In this paper, we study the possibility of using anonymous communication as a building block, and show that one can leverage on anonymity in a variety of cryptographic contexts. Our results go in two directions. middot Feasibility. We show that anonymous communication over insecure channels can be used to implement unconditionally secure point-to-point channels, broadcast, and general multi-party protocols that remain unconditionally secure as long as less than half of the players are maliciously corrupted. middot Efficiency. We show that anonymous channels can yield substantial efficiency improvements for several natural secure computation tasks. In particular, we present the first solution to the problem of private information retrieval (PIR) which can handle multiple users while being close to optimal with respect to both communication and computation
Keywords
cryptography; anonymous communication; cryptography; insecure channels; private information retrieval; secure computation; Broadcasting; Computer science; Context; Costs; Cryptographic protocols; Cryptography; Distributed computing; Information retrieval; Information security; Privacy;
fLanguage
English
Publisher
ieee
Conference_Titel
Foundations of Computer Science, 2006. FOCS '06. 47th Annual IEEE Symposium on
Conference_Location
Berkeley, CA
ISSN
0272-5428
Print_ISBN
0-7695-2720-5
Type
conf
DOI
10.1109/FOCS.2006.25
Filename
4031360
Link To Document