Paper 2022/1535
Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge
Abstract
In the setting of subversion, an adversary tampers with the machines of the honest parties thus leaking the honest parties' secrets through the protocol transcript. The work of Mironov and Stephens-Davidowitz (EUROCRYPT’15) introduced the idea of reverse firewalls (RF) to protect against tampering of honest parties' machines. All known constructions in the RF framework rely on the malleability of the underlying operations in order for the RF to rerandomize/sanitize the transcript. RFs are thus limited to protocols that offer some structure, and hence based on public-key operations. In this work, we initiate the study of
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- A minor revision of an IACR publication in EUROCRYPT 2023
- Keywords
- SubversionReverse FirewallsOblivious Transfer ExtensionZero-Knowledge
- Contact author(s)
-
suvradip1111 @ gmail com
chaya @ iisc ac in
pratik93 @ bu edu - History
- 2023-02-23: revised
- 2022-11-05: received
- See all versions
- Short URL
- https://ia.cr/2022/1535
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2022/1535, author = {Suvradip Chakraborty and Chaya Ganesh and Pratik Sarkar}, title = {Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge}, howpublished = {Cryptology {ePrint} Archive, Paper 2022/1535}, year = {2022}, url = {https://eprint.iacr.org/2022/1535} }