More efficient oblivious transfer extensions with security for malicious adversaries

Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner

نتاج البحث: فصل من :كتاب / تقرير / مؤتمرمنشور من مؤتمرمراجعة النظراء

ملخص

Oblivious transfer (OT) is one of the most fundamental primitives in cryptography and is widely used in protocols for secure two party and multi-party computation. As secure computation becomes more practical, the need for practical large scale oblivious transfer protocols is becoming more evident. Oblivious transfer extensions are protocols that enable a relatively small number of “base-OTs” to be utilized to compute a very large number of OTs at low cost. In the semi-honest setting, Ishai et al. (CRYPTO 2003) presented an OT extension protocol for which the cost of each OT (beyond the base-OTs) is just a few hash function operations. In the malicious setting, Nielsen et al. (CRYPTO 2012) presented an efficient OT extension protocol for the setting of active adversaries, that is secure in the random oracle model. In this work, we present an OT extension protocol for the setting of malicious adversaries that is more efficient and uses less communication than previous works. In addition, our protocol can be proven secure in both the random oracle model, and in the standard model with a type of correlation robustness. Given the importance of OT in many secure computation protocols, increasing the efficiency of OT extensions is another important step forward to making secure computation practical.

اللغة الأصليةالإنجليزيّة
عنوان منشور المضيفAdvances in Cryptology – EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
المحررونMarc Fischlin, Elisabeth Oswald
ناشرSpringer Verlag
الصفحات673-701
عدد الصفحات29
رقم المعيار الدولي للكتب (المطبوع)9783662467992
المعرِّفات الرقمية للأشياء
حالة النشرنُشِر - 2015
الحدث34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2015 - Sofia, بلغاريا
المدة: ٢٦ أبريل ٢٠١٥٣٠ أبريل ٢٠١٥

سلسلة المنشورات

الاسمLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
مستوى الصوت9056

!!Conference

!!Conference34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2015
الدولة/الإقليمبلغاريا
المدينةSofia
المدة٢٦/٠٤/١٥٣٠/٠٤/١٥

All Science Journal Classification (ASJC) codes

  • !!Theoretical Computer Science
  • !!General Computer Science

بصمة

أدرس بدقة موضوعات البحث “More efficient oblivious transfer extensions with security for malicious adversaries'. فهما يشكلان معًا بصمة فريدة.

قم بذكر هذا