License: Creative Commons Attribution 4.0 International license (CC BY 4.0)
When quoting this document, please refer to the following
DOI: 10.4230/LIPIcs.ITC.2022.5
URN: urn:nbn:de:0030-drops-164836
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2022/16483/
Go to the corresponding LIPIcs Volume Portal


Madathil, Varun ; Orsini, Chris ; Scafuro, Alessandra ; Venturi, Daniele

From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-Theoretic

pdf-format:
LIPIcs-ITC-2022-5.pdf (0.8 MB)


Abstract

We present an information-theoretic transformation from any 2-round OT protocol with only game-based security in the presence of malicious adversaries into a 4-round (which is known to be optimal) OT protocol with simulation-based security in the presence of malicious adversaries.
Our transform is the first satisfying all of the following properties at the same time:
- It is in the plain model, without requiring any setup assumption.
- It only makes black-box usage of the underlying OT protocol.
- It is information-theoretic, as it does not require any further cryptographic assumption (besides the existence of the underlying OT protocol). Additionally, our transform yields a cubic improvement in communication complexity over the best previously known transformation.

BibTeX - Entry

@InProceedings{madathil_et_al:LIPIcs.ITC.2022.5,
  author =	{Madathil, Varun and Orsini, Chris and Scafuro, Alessandra and Venturi, Daniele},
  title =	{{From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-Theoretic}},
  booktitle =	{3rd Conference on Information-Theoretic Cryptography (ITC 2022)},
  pages =	{5:1--5:20},
  series =	{Leibniz International Proceedings in Informatics (LIPIcs)},
  ISBN =	{978-3-95977-238-9},
  ISSN =	{1868-8969},
  year =	{2022},
  volume =	{230},
  editor =	{Dachman-Soled, Dana},
  publisher =	{Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/opus/volltexte/2022/16483},
  URN =		{urn:nbn:de:0030-drops-164836},
  doi =		{10.4230/LIPIcs.ITC.2022.5},
  annote =	{Keywords: Oblivious Transfer, Black-Box compiler, Malicious Security, Plain Model}
}

Keywords: Oblivious Transfer, Black-Box compiler, Malicious Security, Plain Model
Collection: 3rd Conference on Information-Theoretic Cryptography (ITC 2022)
Issue Date: 2022
Date of publication: 30.06.2022


DROPS-Home | Fulltext Search | Imprint | Privacy Published by LZI