Cryptography from anonymity

Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

101 Scopus citations

Abstract

There is a vast body of work on implementing anonymous communication. In this paper, we study the possibility of using anonymous communication as a building block, and show that one can leverage on anonymity in a variety of cryptographic contexts. Our results go in two directions. • Feasibility. We show that anonymous communication over insecure channels can be used to implement unconditionally secure point-to-point channels, broadcast, and general multi-party protocols that remain unconditionally secure as long as less than half of the players are maliciously corrupted. • Efficiency. We show that anonymous channels can yield substantial efficiency improvements for several natural secure computation tasks. In particular, we present the first solution to the problem of private information retrieval (PIR) which can handle multiple users while being close to optimal with respect to both communication and computation.

Original languageEnglish
Title of host publication47th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2006
Pages239-248
Number of pages10
DOIs
StatePublished - 2006
Event47th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2006 - Berkeley, CA, United States
Duration: 21 Oct 200624 Oct 2006

Publication series

NameProceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS
ISSN (Print)0272-5428

Conference

Conference47th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2006
Country/TerritoryUnited States
CityBerkeley, CA
Period21/10/0624/10/06

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Cryptography from anonymity'. Together they form a unique fingerprint.

Cite this