On unconditionally secure distributed oblivious transfer

被引:14
|
作者
Blundo, Carlo [1 ]
D'Arco, Paolo
De Santis, Alfredo
Stinson, Douglas
机构
[1] Univ Salerno, Dipartimento Informat & Applicaz, I-84084 Fisciano, SA, Italy
[2] Univ Waterloo, David R Cheriton Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
关键词
oblivious transfer; secret sharing; distributed cryptography;
D O I
10.1007/s00145-007-0327-2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper is about the oblivious transfer in the distributed model proposed by Naor and Pinkas. In this setting a Sender has n secrets and a Receiver is interested in one of them. During a set-up phase, the Sender gives information about the secrets to m Servers. Afterwards, in a recovering phase, the Receiver can compute the secret she wishes by interacting with any k of them. More precisely, from the answers received she computes the secret in which she is interested but she gets no information on the others and, at the same time, any coalition of k - 1 Servers can neither compute any secret nor figure out which one the Receiver has recovered. We present an analysis and new results holding for this model: lower bounds on the resources required to implement such a scheme (i.e., randomness, memory storage, communication complexity); some impossibility results for one-round distributed oblivious transfer protocols; two polynomial-based constructions implementing 1-out-of-n distributed oblivious transfer, which generalize and strengthen the two constructions for 1-out-of-2 given by Naor and Pinkas; as well as new one-round and two-round distributed oblivious transfer protocols, both for threshold and general access structures on the set of Servers, which are optimal with respect to some of the given bounds. Most of these constructions are basically combinatorial in nature.
引用
收藏
页码:323 / 373
页数:51
相关论文
共 50 条
  • [1] On unconditionally secure distributed oblivious transfer
    Nikov, V
    Nikova, S
    Preneel, B
    Vandewalle, J
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS, 2002, 2551 : 395 - 408
  • [2] On Unconditionally Secure Distributed Oblivious Transfer
    Carlo Blundo
    Paolo D'Arco
    Alfredo De Santis
    Douglas Stinson
    [J]. Journal of Cryptology, 2007, 20 : 323 - 373
  • [3] Analysis of an Unconditionally Secure Distributed Oblivious Transfer
    Hossein Ghodosi
    [J]. Journal of Cryptology, 2013, 26 : 75 - 79
  • [4] Analysis of an Unconditionally Secure Distributed Oblivious Transfer
    Ghodosi, Hossein
    [J]. JOURNAL OF CRYPTOLOGY, 2013, 26 (01) : 75 - 79
  • [5] New results on unconditionally secure distributed oblivious transfer (Extended abstract)
    Blundo, C
    D'Arco, P
    De Santis, A
    Stinson, DR
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 291 - 309
  • [6] Unconditionally Secure Distributed Oblivious Polynomial Evaluation
    Cianciullo, Louis
    Ghodosi, Hossein
    [J]. INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 132 - 142
  • [7] On Unconditionally Secure Oblivious Transfer from Continuous Channels
    Isaka, Motohiko
    [J]. 2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, : 2617 - 2621
  • [8] Unconditionally Secure Oblivious Transfer Based on Channel Delays
    Cheong, Kai-Yuen
    Miyaji, Atsuko
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 112 - 120
  • [9] Practical and unconditionally secure spacetime-constrained oblivious transfer
    Pitalua-Garcia, Damian
    Kerenidis, Iordanis
    [J]. PHYSICAL REVIEW A, 2018, 98 (03)
  • [10] Unconditionally Secure Oblivious Transfer from Algebraic Signaling over the Gaussian Channel
    Isaka, Motohiko
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (11) : 2017 - 2025