DocumentCode :
3704002
Title :
Cut-and-Choose Bilateral Oblivious Transfer and Its Application
Author :
Chuan Zhao;Han Jiang;Xiaochao Wei;Qiuliang Xu;Minghao Zhao
Author_Institution :
Sch. of Comput. Sci. &
Volume :
1
fYear :
2015
Firstpage :
384
Lastpage :
391
Abstract :
Oblivious transfer is a fundamental tool in cryptographic protocols, especially in secure two-party computation. In TCC 2011, Lindell and Pinkas proposed a variant called cut-and-choose oblivious transfer, which did a great job in solving the selective failure attack in secure two-party computation protocols based on cut-and-choose paradigm. In this paper, we present a new primitive called cut-and-choose bilateral oblivious transfer. As an extension to cut-and-choose oblivious transfer, in addition to overcoming the selective failure attack, this primitive also makes a contribution to reducing the round number of the protocols that invoke it. This is very important in the scenarios where interactions between parties are limited. Besides, the application of this primitive in the outer protocols enables us to present a more modular and clean high-level description of the protocol framework. Furthermore, we believe that the new primitive is of independent research interest itself and could be useful in many cut-and-choose scenarios. Based on homomorphic encryption, we construct an efficient instantiation of this primitive in malicious model, and present a formal rigorous proof of its security under ideal/real simulation paradigm.
Keywords :
"Protocols","Encryption","Receivers","Computational modeling","Standards","Wires"
Publisher :
ieee
Conference_Titel :
Trustcom/BigDataSE/ISPA, 2015 IEEE
Type :
conf
DOI :
10.1109/Trustcom.2015.398
Filename :
7345306
Link To Document :
بازگشت