首页 | 本学科首页   官方微博 | 高级检索  
     


Computationally Secure Oblivious Transfer
Authors:Moni Naor  Benny Pinkas
Affiliation:(1) Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot 76100, Israel;(2) HP Labs, 5 Vaughn Drive, Princeton, NJ 08540, USA
Abstract:We describe new computationally secure protocols of 1-out-of-N oblivious transfer, k-out-of-N oblivious transfer, and oblivious transfer with adaptive queries. The protocols are very efficient compared with solutions based on generic two-party computation or on information-theoretic security.The 1-out-of-N oblivious transfer protocolrequires only log N executions of a 1-out-of-2oblivious transfer protocol. Thek-out-of-N protocol is considerably more efficient than krepetitions of 1-out-of-N oblivious transfer, as is the construction for oblivious transfer with adaptive queries. The efficiency of the new oblivious transfer protocols makes them useful for many applications. A direct corollary ofthe 1-out-of-N oblivious transfer protocol is an efficient transformationof any Private Information Retrieval protocol to a Symmetric PIR protocol.
Keywords:Cryptography  Privacy preserving computation  Secure function evaluation  Oblivious transfer
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号