New results on unconditionally secure distributed oblivious transfer (Extended abstract)

被引:0
|
作者
Blundo, C [1 ]
D'Arco, P
De Santis, A
Stinson, DR
机构
[1] Univ Salerno, Dipartimento Informat & Applicaz, I-84081 Baronissi, SA, Italy
[2] Univ Waterloo, Dept Combinator & Optimizat, Waterloo, ON N2L 3G1, Canada
[3] Univ Waterloo, Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper is about the Oblivious Transfer in the distributed model recently proposed by M. Naor and B. Pinkas. In this setting a Sender has n secrets and a Receiver is interested in one of them. During a set up phase, the Sender gives information about the secrets to m servers. Afterwards, in a recovering phase, the receiver can compute the secret she wishes by interacting with k of them. More precisely, from the answers received she computes the secret in which she is interested but she gets no information on the others and, at the same time, any coalition of k - 1 servers can neither compute any secret nor figure out which one the receiver has recovered. We present,an analysis and new results holding for this model: lower bounds on the resources required to implement such a scheme (i.e., randomness, memory storage, communication complexity); some impossibility results for one-round distributed oblivious transfer protocols; two polynomial-based constructions implementing 1-out-of-n distributed oblivious transfer, which generalize the two constructions for 1-out-of-2 given by Naor and Pinkas; as well as new one-round and two-round distributed oblivious transfer protocols, both for threshold and general access structures on the set of servers, which are optimal with respect to some of the given bounds. Most of these constructions are basically combinatorial in nature.
引用
收藏
页码:291 / 309
页数:19
相关论文
共 50 条
  • [21] Computationally secure oblivious transfer
    Naor, M
    Pinkas, B
    JOURNAL OF CRYPTOLOGY, 2005, 18 (01) : 1 - 35
  • [22] New constructions for secure hash functions (Extended abstract)
    Aiello, W
    Haber, S
    Venkatesan, R
    FAST SOFTWARE ENCRYPTION, 1998, 1372 : 150 - 167
  • [23] Computationally Secure Quantum Oblivious Transfer
    Wang, Ping
    Zhang, Rui
    Jiang, Guohao
    Sun, Zhiwei
    ADVANCED QUANTUM TECHNOLOGIES, 2022, 5 (01)
  • [24] A PROVABLY SECURE OBLIVIOUS TRANSFER PROTOCOL
    BERGER, R
    PERALTA, R
    TEDRICK, T
    LECTURE NOTES IN COMPUTER SCIENCE, 1985, 209 : 379 - 386
  • [25] New Results on Unconditionally Secure Multi-receiver Manual Authentication
    Wang, Shuhong
    Safavi-Naini, Reihaneh
    INFORMATION THEORETIC SECURITY, 2009, 4883 : 115 - 132
  • [26] Secure extended wildcard pattern matching protocol from cut-and-choose oblivious transfer
    Wei, Xiaochao
    Xu, Lin
    Zhao, Minghao
    Wang, Hao
    INFORMATION SCIENCES, 2020, 529 : 132 - 140
  • [27] Quantum Oblivious Transfer: a secure practical implementation
    Marius Nagy
    Naya Nagy
    Quantum Information Processing, 2016, 15 : 5037 - 5050
  • [28] A computationally secure quantum oblivious transfer scheme
    Lü, X
    Ma, Z
    Feng, DG
    8th International Conference on Advanced Communication Technology, Vols 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U1547 - U1551
  • [29] On unconditionally secure robust distributed Key Distribution Centers
    D'Arco, P
    Stinson, DR
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 346 - 363
  • [30] Unconditionally secure homomorphic pre-distributed commitments
    Nascimento, ACA
    Otsuka, A
    Imai, H
    Mueller-Quade, J
    APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES, PROCEEDINGS, 2003, 2643 : 87 - 97