Privacy-Preserving Protocols with Oblivious Transfer and Mix Networks

dc.contributor.advisorSherman, Alan
dc.contributor.authorJavani, Farid
dc.contributor.departmentComputer Science and Electrical Engineering
dc.contributor.programComputer Science
dc.date.accessioned2022-02-09T15:52:33Z
dc.date.available2022-02-09T15:52:33Z
dc.date.issued2020-01-01
dc.description.abstractWe propose and analyze security protocols to safeguard user privacy. We use oblivioustransfer (OT) as the main cryptographic primitive---and mix network architecture---to design two protocols: 1) BVOT, a boardroom voting protocol with ballot secrecy using OT, and 2) AOT, an anonymous communication protocol using OT. We also analyze and improve cMix, an anonymous communication system with precomputation. Our first protocol, BVOT, uses OT to facilitate boardroom voting, an election with a smallnumber of voters. BVOT provides perfect ballot secrecy: unless all the voters conspire against one voter, none of the voters nor any external party can learn how voters cast their votes. Voters hide their votes before casting them, without the need to provide any proof for correctness of their vote. This property is a significant improvement as existing voting protocols with vote hiding property require the voters to provide zero-knowledge proofs for correctness of their vote and check zero-knowledge proofs provided by other voters to verify correctness of their votes. Our protocol is self tallying: after votes are cast, any of the voters can tally the votes. Our protocol is fair: none of the voters can compute the tally before casting their vote. Our protocol supports elections with any number of candidates. Our second protocol, AOT, provides anonymous two-way communications using OT. As the maincryptographic primitive in AOT, OT delivers messages to recipients anonymously. To our knowledge, AOT is the first protocol that uses OT to facilitate anonymous communication. Users of AOT do not have to register with the system; any entity who knows the public key of any middle-layer node in the system can send messages with AOT. AOT does not need the address of the recipient of a message to deliver the message. AOT does not learn any information about the recipient of a message, nor does it learn if a message has been delivered. AOT provides receiver anonymity---an adversary cannot distinguish who received the message from among all users receiving some message---even if the covert adversary controls all nodes in AOT. Next we briefly overview and analyze the performance of cMix, an anonymous communicationprotocol that does not perform any public-key operation during run-time. The author of this dissertations is a member of the team that engineered, implemented, and analyzed cMix. The author's main contributions to the cMix project are the formal description of the protocol, performance analysis, and implementation of cMix. cMix, a mix network with a fixed cascade architecture, uses multi-party group homomorphicencryption to create a shared secret in the precomputation phase and uses this shared secret to eliminate the need for computationally expensive public-key operations during run-time. cMix is distinct from previous precomputation based mixnets in that it completely eliminates public-key operations, both on the client and server sides. The original cMix protocol does not resist active blending attacks. We propose two techniques to make cMix resistant to blending attacks, one of which requires only one honest mixnode.
dc.formatapplication:pdf
dc.genredissertations
dc.identifierdoi:10.13016/m2o8cg-ear5
dc.identifier.other12338
dc.identifier.urihttp://hdl.handle.net/11603/24176
dc.languageen
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Theses and Dissertations Collection
dc.relation.ispartofUMBC Graduate School Collection
dc.relation.ispartofUMBC Student Collection
dc.sourceOriginal File Name: Javani_umbc_0434D_12338.pdf
dc.subjectAnonymous Communications
dc.subjectApplied Cryptography
dc.subjectBoardroom Voting
dc.subjectOblivious Transfer
dc.subjectPrivacy
dc.subjectSecurity Protocols
dc.titlePrivacy-Preserving Protocols with Oblivious Transfer and Mix Networks
dc.typeText
dcterms.accessRightsAccess limited to the UMBC community. Item may possibly be obtained via Interlibrary Loan through a local library, pending author/copyright holder's permission.
dcterms.accessRightsThis item may be protected under Title 17 of the U.S. Copyright Law. It is made available by UMBC for non-commercial research and education. For permission to publish or reproduce, please see http://aok.lib.umbc.edu/specoll/repro.php or contact Special Collections at speccoll(at)umbc.edu

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Javani_umbc_0434D_12338.pdf
Size:
1.48 MB
Format:
Adobe Portable Document Format