Computationally Secure Oblivious Transfer |
| |
Authors: | Moni Naor Benny Pinkas |
| |
Affiliation: | (1) Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot 76100, Israel;(2) HP Labs, 5 Vaughn Drive, Princeton, NJ 08540, USA |
| |
Abstract: | We describe new computationally secure protocols of 1-out-of-N oblivious transfer, k-out-of-N oblivious transfer, and oblivious transfer with adaptive queries. The protocols are very efficient compared with solutions based on generic two-party computation or on information-theoretic security.The 1-out-of-N oblivious transfer protocolrequires only log N executions of a 1-out-of-2oblivious transfer protocol. Thek-out-of-N protocol is considerably more efficient than krepetitions of 1-out-of-N oblivious transfer, as is the construction for oblivious transfer with adaptive queries. The efficiency of the new oblivious transfer protocols makes them useful for many applications. A direct corollary ofthe 1-out-of-N oblivious transfer protocol is an efficient transformationof any Private Information Retrieval protocol to a Symmetric PIR protocol. |
| |
Keywords: | Cryptography Privacy preserving computation Secure function evaluation Oblivious transfer |
本文献已被 SpringerLink 等数据库收录! |
|