Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters

被引:67
作者
Tzeng, WG [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp & Informat Sci, Hsinchu 30050, Taiwan
关键词
oblivious transfer; distributed oblivious transfer; private information retrieval;
D O I
10.1109/TC.2004.1261831
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose efficient and secure (string) oblivious transfer (OTn1) schemes for any n greater than or equal to 2. We build our OTn1 scheme from fundamental cryptographic techniques directly. The receiver's choice is unconditionally secure and the secrecy of the unchosen secrets is based on the hardness of the decisional Diffie-Hellman problem. Some schemes achieve optimal efficiency in terms of the number of rounds and the total number of exchanged messages for the case that the receiver's choice is unconditionally secure. The distinct feature of our scheme is that the system-wide parameters are independent of n and universally usable, that is, all possible receivers and senders use the same parameters and need no trapdoors specific to each of them. We extend our OTn1 schemes to distributed oblivious transfer schemes. Our distributed OTn1 schemes take full advantage of the research results of secret sharing. For applications, we present a method of transforming any (single-database) PIR protocol into a symmetric PIR protocol by slightly increasing the communication cost only.
引用
收藏
页码:232 / 240
页数:9
相关论文
共 46 条
[1]  
Aiello B, 2001, LECT NOTES COMPUT SC, V2045, P119
[2]   Locally random reductions: Improvements and applications [J].
Beaver, D ;
Feigenbaum, J ;
Kilian, J ;
Rogaway, P .
JOURNAL OF CRYPTOLOGY, 1997, 10 (01) :17-36
[3]  
BEAVER D, 1993, P ADV CRYPTOLOGY EUR, P285
[4]  
Bellare M., 1990, Advances in Cryptology - CRYPTO '89. Proceedings, P547
[5]  
Bellare M., 1995, P 1 ACM C COMPUTER C, P62
[6]  
Ben-Or Michael, 1988, P 20 ANN ACM S THEOR, P1, DOI DOI 10.1145/62212.62213
[7]  
BRASSARD G, 1987, LECT NOTES COMPUT SC, V263, P234
[8]   Oblivious transfers and intersecting codes [J].
Brassard, G ;
Crepeau, C ;
Santha, M .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1996, 42 (06) :1769-1780
[9]  
BRASSARD G, 1986, P 27 IEEE S FDN COMP, P168
[10]  
Brassard G, 1997, P ADV CRYPTOLOGY EUR, P334