Toward Wireless Security without Computational Assumptions #x2014;Oblivious Transfer Based on Wireless Channel Characteristics
Title | Toward Wireless Security without Computational Assumptions #x2014;Oblivious Transfer Based on Wireless Channel Characteristics |
Publication Type | Journal Article |
Year of Publication | 2014 |
Authors | Zhuo Hao, Yunlong Mao, Sheng Zhong, Li, L.E., Haifan Yao, Nenghai Yu |
Journal | Computers, IEEE Transactions on |
Volume | 63 |
Pagination | 1580-1593 |
Date Published | June |
ISSN | 0018-9340 |
Keywords | 1-out-of-2 oblivious transfer protocol, Channel estimation, Communication system security, computational assumptions, computational complexity, cryptographic protocol, cryptographic protocols, cryptographic tools, cryptography, data privacy, Oblivious transfer, physical channel characteristics, polynomial-time computable function, privacy preserving password verification, private communications, Probes, Protocols, security, transport protocols, wireless channel characteristics, wireless channels, Wireless communication, wireless devices, wireless security |
Abstract | Wireless security has been an active research area since the last decade. A lot of studies of wireless security use cryptographic tools, but traditional cryptographic tools are normally based on computational assumptions, which may turn out to be invalid in the future. Consequently, it is very desirable to build cryptographic tools that do not rely on computational assumptions. In this paper, we focus on a crucial cryptographic tool, namely 1-out-of-2 oblivious transfer. This tool plays a central role in cryptography because we can build a cryptographic protocol for any polynomial-time computable function using this tool. We present a novel 1-out-of-2 oblivious transfer protocol based on wireless channel characteristics, which does not rely on any computational assumption. We also illustrate the potential broad applications of this protocol by giving two applications, one on private communications and the other on privacy preserving password verification. We have fully implemented this protocol on wireless devices and conducted experiments in real environments to evaluate the protocol. Our experimental results demonstrate that it has reasonable efficiency. |
DOI | 10.1109/TC.2013.27 |
Citation Key | 6463377 |
- polynomial-time computable function
- wireless security
- wireless devices
- Wireless communication
- wireless channels
- wireless channel characteristics
- transport protocols
- security
- Protocols
- Probes
- private communications
- privacy preserving password verification
- 1-out-of-2 oblivious transfer protocol
- physical channel characteristics
- Oblivious transfer
- data privacy
- Cryptography
- cryptographic tools
- Cryptographic Protocols
- cryptographic protocol
- computational complexity
- computational assumptions
- Communication system security
- Channel estimation