DocumentCode
3704002
Title
Cut-and-Choose Bilateral Oblivious Transfer and Its Application
Author
Chuan Zhao;Han Jiang;Xiaochao Wei;Qiuliang Xu;Minghao Zhao
Author_Institution
Sch. of Comput. Sci. &
Volume
1
fYear
2015
Firstpage
384
Lastpage
391
Abstract
Oblivious transfer is a fundamental tool in cryptographic protocols, especially in secure two-party computation. In TCC 2011, Lindell and Pinkas proposed a variant called cut-and-choose oblivious transfer, which did a great job in solving the selective failure attack in secure two-party computation protocols based on cut-and-choose paradigm. In this paper, we present a new primitive called cut-and-choose bilateral oblivious transfer. As an extension to cut-and-choose oblivious transfer, in addition to overcoming the selective failure attack, this primitive also makes a contribution to reducing the round number of the protocols that invoke it. This is very important in the scenarios where interactions between parties are limited. Besides, the application of this primitive in the outer protocols enables us to present a more modular and clean high-level description of the protocol framework. Furthermore, we believe that the new primitive is of independent research interest itself and could be useful in many cut-and-choose scenarios. Based on homomorphic encryption, we construct an efficient instantiation of this primitive in malicious model, and present a formal rigorous proof of its security under ideal/real simulation paradigm.
Keywords
"Protocols","Encryption","Receivers","Computational modeling","Standards","Wires"
Publisher
ieee
Conference_Titel
Trustcom/BigDataSE/ISPA, 2015 IEEE
Type
conf
DOI
10.1109/Trustcom.2015.398
Filename
7345306
Link To Document