You are looking at a specific version 20061106:140427 of this paper. See the latest version.

Paper 2006/084

Cryptography from Anonymity

Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai

Abstract

There is a vast body of work on {\em implementing} anonymous communication. In this paper, we study the possibility of using anonymous communication as a {\em building block}, and show that one can leverage on anonymity in a variety of cryptographic contexts. Our results go in two directions. \begin{itemize} \item{\bf Feasibility.} We show that anonymous communication over {\em insecure} channels can be used to implement unconditionally secure point-to-point channels, and hence general multi-party protocols with unconditional security in the presence of an honest majority. In contrast, anonymity cannot be generally used to obtain unconditional security when there is no honest majority. \item{\bf Efficiency.} We show that anonymous channels can yield substantial efficiency improvements for several natural secure computation tasks. In particular, we present the first solution to the problem of private information retrieval (PIR) which can handle multiple users while being close to optimal with respect to {\em both} communication and computation. A key observation that underlies these results is that {\em local randomization} of inputs, via secret-sharing, when combined with the {\em global mixing} of the shares, provided by anonymity, allows to carry out useful computations on the inputs while keeping the inputs private. \end{itemize}

Metadata
Available format(s)
PDF PS
Category
Foundations
Publication info
Published elsewhere. FOCS 2006
Contact author(s)
yuvali @ cs technion ac il
History
2006-11-06: revised
2006-03-06: received
See all versions
Short URL
https://ia.cr/2006/084
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.