The Community for Technology Leaders
Green Image
Issue No. 06 - June (2014 vol. 63)
ISSN: 0018-9340
pp: 1580-1593
Zhuo Hao , Department of Electronic Engineering and Information Science, University of Science and Technology of China, Hefei, China
Yunlong Mao , State Key Laboratory of Novel Software Technology, Nanjing University, Nanjing, China
Sheng Zhong , State Key Laboratory of Novel Software Technology, Nanjing University, Nanjing, China
Li Erran Li , Networking Research Laboratory–Bell Labs, Alcatel-Lucent, Berkeley Height,
Haifan Yao , Department of Computer Science and Engineering, State University of New York at Buffalo, Buffalo,
Nenghai Yu , Department of Electronic Engineering and Information Science, University of Science and Technology of China, Hefei, China
ABSTRACT
Wireless security has been an active research area since the last decade. A lot of studies of wireless security use cryptographic tools, but traditional cryptographic tools are normally based on computational assumptions, which may turn out to be invalid in the future. Consequently, it is very desirable to build cryptographic tools that do not rely on computational assumptions. In this paper, we focus on a crucial cryptographic tool, namely 1-out-of-2 oblivious transfer. This tool plays a central role in cryptography because we can build a cryptographic protocol for any polynomial-time computable function using this tool. We present a novel 1-out-of-2 oblivious transfer protocol based on wireless channel characteristics, which does not rely on any computational assumption. We also illustrate the potential broad applications of this protocol by giving two applications, one on private communications and the other on privacy preserving password verification. We have fully implemented this protocol on wireless devices and conducted experiments in real environments to evaluate the protocol. Our experimental results demonstrate that it has reasonable efficiency.
INDEX TERMS
Protocols, Communication system security, Cryptography, Probes, Wireless communication, Channel estimation
CITATION

Z. Hao, Y. Mao, S. Zhong, L. E. Li, H. Yao and N. Yu, "Toward Wireless Security without Computational Assumptions—Oblivious Transfer Based on Wireless Channel Characteristics," in IEEE Transactions on Computers, vol. 63, no. 6, pp. 1580-1593, 2014.
doi:10.1109/TC.2013.27
176 ms
(Ver 3.3 (11022016))