License: Creative Commons Attribution 4.0 International license (CC BY 4.0)
When quoting this document, please refer to the following
DOI: 10.4230/LIPIcs.ITC.2022.5
URN: urn:nbn:de:0030-drops-164836
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2022/16483/
Madathil, Varun ;
Orsini, Chris ;
Scafuro, Alessandra ;
Venturi, Daniele
From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-Theoretic
Abstract
We present an information-theoretic transformation from any 2-round OT protocol with only game-based security in the presence of malicious adversaries into a 4-round (which is known to be optimal) OT protocol with simulation-based security in the presence of malicious adversaries.
Our transform is the first satisfying all of the following properties at the same time:
- It is in the plain model, without requiring any setup assumption.
- It only makes black-box usage of the underlying OT protocol.
- It is information-theoretic, as it does not require any further cryptographic assumption (besides the existence of the underlying OT protocol). Additionally, our transform yields a cubic improvement in communication complexity over the best previously known transformation.
BibTeX - Entry
@InProceedings{madathil_et_al:LIPIcs.ITC.2022.5,
author = {Madathil, Varun and Orsini, Chris and Scafuro, Alessandra and Venturi, Daniele},
title = {{From Privacy-Only to Simulatable OT: Black-Box, Round-Optimal, Information-Theoretic}},
booktitle = {3rd Conference on Information-Theoretic Cryptography (ITC 2022)},
pages = {5:1--5:20},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-95977-238-9},
ISSN = {1868-8969},
year = {2022},
volume = {230},
editor = {Dachman-Soled, Dana},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/opus/volltexte/2022/16483},
URN = {urn:nbn:de:0030-drops-164836},
doi = {10.4230/LIPIcs.ITC.2022.5},
annote = {Keywords: Oblivious Transfer, Black-Box compiler, Malicious Security, Plain Model}
}
Keywords: |
|
Oblivious Transfer, Black-Box compiler, Malicious Security, Plain Model |
Collection: |
|
3rd Conference on Information-Theoretic Cryptography (ITC 2022) |
Issue Date: |
|
2022 |
Date of publication: |
|
30.06.2022 |