Constructions for Conditional Oblivious/converge Transfer/cast Constructions for Conditional Oblivious/converge Transfer/cast
نویسنده
چکیده
In this paper, we introduce a new notion of conditional converge cast (CCC), such that we append the conditional property to converge cast. Additionally, we generalize the three primitives with conditional property, conditional oblivious transfer (COT), conditional oblivious cast (COC), and CCC. CCC is a three-party protocol which involves two senders S0 and S1 and a receiver R. S0 owns a secret x and a message m0, and S1 y and m1. In a CCC protocol for the predicate Q (Q-CCC), S0 and S1 send their messages to R in a masked form. R obtains the message depending on the value of Q(x, y), i.e. R obtains m0 if Q(x, y) = 0 and m1 otherwise. Besides, the secrets x and y cannot be revealed to R or the other sender. We propose a CCC protocol for “equality” predicate with an additively homomorphic encryption scheme. Additionally, we extend 1-out-of-2 COT/COC/CCC to 1-out-of-n COT/COC/CCC. In 1-out-of-2 protocols, a sender or senders send two messages to a receiver or receivers. In 1-outof-n protocols, a sender or senders send n messages, where n = 2 for some l. We provide the consecutive definitions and the concrete protocols for 1-out-of-n COT/COC/CCC protocols. We prove that our protocols are secure under the security of 1-out-of-2 protocols.
منابع مشابه
Conditional Oblivious Cast
We introduce a new notion of conditional oblivious cast (COC), which involves three parties: a sender S and two receivers A and B. Receivers A and B own their secrets x and y, respectively, and the sender S holds the message m. In a COC scheme for the predicate Q (Q-COC), A and B send x and y in a masked form to S, and then S sends m to A and B such that they get m if and only if Q(x, y) = 1. B...
متن کاملConditional Oblivious Transfer and Timed-Release Encryption
We consider the problem of sending messages \into the future." Previous constructions for this task were either based on heuristic assumptions or did not provide anonymity to the sender of the message. In the public-key setting, we present an e cient and secure timed-release encryption scheme using a \time server" which inputs the current time into the system. The server has to only interact wi...
متن کاملGeneralizing Efficient Multiparty Computation
We focus on generalizing constructions of Batch Single-Choice Cut-And-Choose Oblivious Transfer and Multi-sender k-out-of-n Oblivious Transfer, which are at the core of efficient secure computation constructions proposed by Lindell et al. and the IPS compiler. Our approach consists in showing that such primitives can be based on a much weaker and simpler primitive called Verifiable Oblivious Tr...
متن کاملBlack-Box Constructions of Protocols for Secure Computation
In this paper, we study the question of whether or not it is possible to construct protocols for general secure computation in the setting of malicious adversaries and no honest majority that use the underlying primitive (e.g., enhanced trapdoor permutation) in a black-box way only. Until now, all known general constructions for this setting were inherently non-blackbox since they required the ...
متن کاملBlind attribute-based encryption and oblivious transfer with fine-grained access control
We propose two constructions of oblivious transfer with access control (OTAC), i.e., oblivious transfer schemes in which a receiver can obtain a message only if her attributes, which are certified by a credential issuer, satisfy the access control policy of that message. The receiver remains anonymous towards the sender and the receiver’s attributes are not disclosed to the sender. Our construc...
متن کامل