Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model

被引:19
作者
Pinto, Adriana C. B. [1 ]
Dowsley, Rafael [1 ]
Morozov, Kirill [2 ]
Nascimento, Anderson C. A. [1 ]
机构
[1] Univ Brasilia, Dept Elect Engn, BR-70910900 Brasilia, DF, Brazil
[2] Natl Inst Adv Ind Sci & Technol, Res Ctr Informat Secur, Takamatsu, Kagawa, Japan
关键词
Generalized erasure channel; information-theoretic security; interactive hashing; oblivious transfer; oblivious transfer capacity; PRIVACY AMPLIFICATION; EXTRACTORS;
D O I
10.1109/TIT.2011.2158898
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information-theoretically secure string oblivious transfer (OT) can be constructed based on discrete memoryless channel (DMC). The oblivious transfer capacity of a channel characterizes-similarly to the (standard) information capacity-how efficiently it can be exploited for secure oblivious transfer of strings. The OT capacity of a generalized erasure channel (GEC)-which is a combination of a (general) DMC with the erasure channel-has been established by Ahlswede and Csizar at ISIT'07 in the case of passive adversaries. In this paper, we present the protocol that achieves this capacity against malicious adversaries for GEC with erasure probability at least 1/2. Our construction is based on the protocol of Crepeau and Savvides from Eurocrypt'06 which uses interactive hashing (IH). We solve an open question posed by the above paper, by basing it upon a constant round IH scheme (previously proposed by Ding et al. at TCC'04). As a side result, we show that the Ding et al. IH protocol can deal with transmission errors.
引用
收藏
页码:5566 / 5571
页数:6
相关论文
共 34 条
[11]  
Cover T. M., 1975, IEEE T INFORM THEORY, VIT-19, P73
[12]  
Crepeau C., LECT NOTES COMPUTER, V293, P350
[13]  
Crepeau C., 2004, LECT NOTES COMPUTER, V3352, P47
[14]  
Crepeau C., 1997, P EUROCRYPT 1997, P306
[15]  
Crepeau C., 1995, P CRYPTO 1995, P110
[16]  
Crepeau C., 1988, P FOCS 1988, P42
[17]  
Crépeau C, 2008, LECT NOTES COMPUT SC, V5155, P86
[18]  
Crépeau C, 2006, LECT NOTES COMPUT SC, V4004, P201
[19]   Constant-round oblivious transfer in the bounded storage model [J].
Ding, Yan Zong ;
Harnik, Danny ;
Rosen, Alon ;
Shaltiel, Ronen .
JOURNAL OF CRYPTOLOGY, 2007, 20 (02) :165-202
[20]   Fuzzy extractors: How to generate strong keys from biometrics and other noisy data [J].
Dodis, Yevgeniy ;
Ostrovsky, Rafail ;
Reyzin, Leonid ;
Smith, Adam .
SIAM JOURNAL ON COMPUTING, 2008, 38 (01) :97-139