International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR News item: 01 October 2015

Rafael Dowsley, Felipe Lacerda, Anderson C. A. Nascimento
ePrint Report ePrint Report
In the bounded storage model the memory of the adversary is restricted, instead of its computational power. With this different restriction it is possible to design protocols with information-theoretical (instead of only computational) security. We present the first protocols for commitment and oblivious transfer in the bounded storage model with errors, i.e., the model where the public random sources available to the two parties are not exactly the same, but instead are only required to have a small Hamming distance between themselves. Commitment and oblivious transfer protocols were known previously only for the error-free variant of the bounded storage model, which is harder to realize.

Expand

Additional news items may be found on the IACR news page.