Adaptive Oblivious Transfer with Access Control from Lattice Assumptions
نویسندگان
چکیده
Adaptive oblivious transfer (OT) is a protocol where a sender initially commits to a database {Mi}i=1. Then, a receiver can query the sender up to k times with private indexes ρ1, . . . , ρk so as to obtain Mρ1 , . . . ,Mρk and nothing else. Moreover, for each i ∈ [k], the receiver’s choice ρi may depend on previously obtained messages {Mρj}j<i. Oblivious transfer with access control (OT-AC) is a flavor of adaptive OT where database records are protected by distinct access control policies that specify which credentials a receiver should obtain in order to access each Mi. So far, all known OT-AC protocols only support access policies made of conjunctions or rely on ad hoc assumptions in pairing-friendly groups (or both). In this paper, we provide an OT-AC protocol where access policies may consist of any branching program of polynomial length, which is sufficient to realize any access policy in NC1. The security of our protocol is proved under the Learning-with-Errors (LWE) and ShortInteger-Solution (SIS) assumptions. As a result of independent interest, we provide protocols for proving the correct evaluation of a committed branching program on a committed input.
منابع مشابه
Generic Fully Simulatable Adaptive Oblivious Transfer
We aim at constructing adaptive oblivious transfer protocols, enjoying fully simulatable security, from various well-known assumptions such as DDH, d-Linear, QR, DCR, and LWE. To this end, we present two generic constructions of adaptive OT, one of which utilizes verifiable shuffles together with threshold decryption schemes, while the other uses permutation networks together with what we call ...
متن کاملAn Efficient Protocol for Restricted Adaptive Oblivious Transfer
Restricted adaptive oblivious transfer was introduced by Herranz in 2011, which is the main approach to protect user privacy in e-transactions involving operations on digital confidential data or sensitive information. There are many practical applications for restricted adaptive oblivious transfer, such as medical or financial data access, pay-per-view TV, and so on. However, so far as we know...
متن کاملAdaptive Oblivious Transfer and Generalization
Oblivious Transfer (OT) protocols were introduced in the seminal paper of Rabin, and allow a user to retrieve a given number of lines (usually one) in a database, without revealing which ones to the server. The server is ensured that only this given number of lines can be accessed per interaction, and so the others are protected; while the user is ensured that the server does not learn the numb...
متن کاملOn Black-Box Complexity of Universally Composable Security in the CRS Model
In this work, we study the intrinsic complexity of black-box Universally Composable (UC) secure computation based on general assumptions. We present a thorough study in various corruption modelings while focusing on achieving security in the common reference string (CRS) model. Our results involve the following: • Static UC secure computation. Designing the first static UC secure oblivious tran...
متن کاملCryptography and security: Quick reference
Part II Themes Communication in the presence of an adversary. Encryption; efficiency of encryption: important due to pervasive communication; Batch verification. Authentication. Key distribution. Access control. Crypto-analysis: Break hardness assumptions used in cryptography. Make better proofs of security. Proving the security of protocols. Code obfuscation: Hide your intent. 0 knowledge proo...
متن کامل