More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries

被引:56
作者
Asharov, Gilad [1 ]
Lindell, Yehuda [2 ]
Schneider, Thomas [3 ]
Zohner, Michael [3 ]
机构
[1] Hebrew Univ Jerusalem, Jerusalem, Israel
[2] Bar Ilan Univ, Ramat Gan, Israel
[3] Tech Univ Darmstadt, Darmstadt, Germany
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I | 2015年 / 9056卷
关键词
Oblivious transfer extensions; Concrete efficiency; Secure computation; 2-PARTY COMPUTATION; PROTOCOL;
D O I
10.1007/978-3-662-46800-5_26
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Oblivious transfer (OT) is one of the most fundamental primitives in cryptography and is widely used in protocols for secure two-party and multi-party computation. As secure computation becomes more practical, the need for practical large scale oblivious transfer protocols is becoming more evident. Oblivious transfer extensions are protocols that enable a relatively small number of "base-OTs" to be utilized to compute a very large number of OTs at low cost. In the semi-honest setting, Ishai et al. (CRYPTO 2003) presented an OT extension protocol for which the cost of each OT (beyond the base-OTs) is just a few hash function operations. In the malicious setting, Nielsen et al. (CRYPTO 2012) presented an efficient OT extension protocol for the setting of active adversaries, that is secure in the random oracle model. In this work, we present an OT extension protocol for the setting of malicious adversaries that is more efficient and uses less communication than previous works. In addition, our protocol can be proven secure in both the random oracle model, and in the standard model with a type of correlation robustness. Given the importance of OT in many secure computation protocols, increasing the efficiency of OT extensions is another important step forward to making secure computation practical.
引用
收藏
页码:673 / 701
页数:29
相关论文
共 35 条
  • [1] [Anonymous], 1981, TR81 HARV U
  • [2] [Anonymous], 1986, N HOLLAND MATH STUDI
  • [3] Asharov G., 2013, ACM CCS, P535, DOI DOI 10.1145/2508859.2516738
  • [4] Asharov G., 2015, IACR CRYPTOLOGY EPRI
  • [5] Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
    Aumann, Yonatan
    Lindell, Yehuda
    [J]. JOURNAL OF CRYPTOLOGY, 2010, 23 (02) : 281 - 343
  • [6] Beaver D., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P479, DOI 10.1145/237814.237996
  • [7] Damgard Ivan, 2014, Security and Cryptography for Networks. 9th International Conference (SCN 2014). Proceedings: LNCS 8642, P398, DOI 10.1007/978-3-319-10879-7_23
  • [8] Damgård I, 2013, LECT NOTES COMPUT SC, V7785, P621, DOI 10.1007/978-3-642-36594-2_35
  • [9] Dong C., 2013, P 2013 ACM SIGSAC C, P789
  • [10] Ejgenberg Yael., 2012, IACR CRYPTOLOGY EPRI, V2012, P629