More Efficient Oblivious Transfer Extensions

被引:35
作者
Asharov, Gilad [1 ]
Lindell, Yehuda [2 ]
Schneider, Thomas [3 ]
Zohner, Michael [3 ]
机构
[1] IBM TJ Watson Res Ctr, Yorktown Hts, NY 10598 USA
[2] Bar Ilan Univ, Dept Comp Sci, Ramat Gan, Israel
[3] Tech Univ Darmstadt, Dept Comp Sci, Darmstadt, Germany
基金
欧洲研究理事会;
关键词
Cryptographic protocols; Oblivious transfer extension; Implementation; SECURITY; PRIVACY;
D O I
10.1007/s00145-016-9236-6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Oblivious transfer (OT) is one of the most fundamental primitives in cryptography and is widely used in protocols for secure two-party and multi-party computation. As secure computation becomes more practical, the need for practical large-scale OT protocols is becoming more evident. OT extensions are protocols that enable a relatively small number of "base-OTs" to be utilized to compute a very large number of OTs at low cost. In the semi-honest setting, Ishai et al. (Advances in cryptology-CRYPTO'03, vol 2729 of LNCS, Springer, 2003) presented an OT extension protocol for which the cost of each OT (beyond the base-OTs) is just a few hash function operations. In the malicious setting, Nielsen et al. (Advances in cryptology-CRYPTO'12, vol 7417 of LNCS, Springer, 2012) presented an efficient OT extension protocol for the setting of malicious adversaries that is secure in a random oracle model. In this work, we improve OT extensions with respect to communication complexity, computation complexity, and scalability in the semi-honest, covert, and malicious model. Furthermore, we show how to modify our maliciously secure OT extension protocol to achieve security with respect to a version of correlation robustness instead of the random oracle. We also provide specific optimizations of OT extensions that are tailored to the use of OT in various secure computation protocols such as Yao's garbled circuits and the protocol of Goldreich-Micali-Wigderson, which reduce the communication complexity even further. We experimentally verify the efficiency gains of our protocols and optimizations.
引用
收藏
页码:805 / 858
页数:54
相关论文
共 65 条
[41]  
Keller M., 2013, ACM CCS 2013, P549, DOI DOI 10.1145/2508859.2516744
[42]   Actively Secure OT Extension with Optimal Overhead [J].
Keller, Marcel ;
Orsini, Emmanuela ;
Scholl, Peter .
ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 :724-741
[43]  
Kerschbaum F, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P703
[44]  
Kolesnikov V, 2008, LECT NOTES COMPUT SC, V5126, P486, DOI 10.1007/978-3-540-70583-3_40
[45]  
Kolesnikov V, 2013, LECT NOTES COMPUT SC, V8043, P54, DOI 10.1007/978-3-642-40084-1_4
[46]  
Kreuter B., 2012, USENIX SECURITY S, P285
[47]  
Larraia E, 2014, LECT NOTES COMPUT SC, V8617, P495, DOI 10.1007/978-3-662-44381-1_28
[48]  
Larraia Enrique., 2014, International Conference on Cryptology and Information Security in Latin America, P368, DOI DOI 10.1007/978-3-319-16295-9_20
[49]   Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries. [J].
Lindell, Yehuda ;
Riva, Ben .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :579-590
[50]  
Lindell Y, 2013, LECT NOTES COMPUT SC, V7785, P519, DOI 10.1007/978-3-642-36594-2_29