An Oblivious Transfer Protocol with Log-Squared Communication

نویسنده

  • Helger Lipmaa
چکیده

We propose a one-round 1-out-of-n computationally-private information retrieval protocol for `-bit strings with low-degree polylogarithmic receivercomputation, linear sender-computation and communication Θ(k · log n + ` · log n), where k is a possibly non-constant security parameter. The new protocol is receiver-private if the underlying length-flexible additively homomorphic public-key cryptosystem is IND-CPA secure. It can be transformed to a one-round computationally receiver-private and information-theoretically sender-private 1out-of-n oblivious-transfer protocol for `-bit strings, that has the same asymptotic communication and is private in the standard complexity-theoretic model.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Additive Conditional Disclosure of Secrets And Applications

During a conditional disclosure of secrets (CDS) protocol, Alice obtains a secret, held by Bob, if and only if her inputs to the protocol were “valid”. As an output masking technique, CDS protocol can be used as a subroutine in other protocols to guarantee either Bob-privacy or correctness against a malicious Alice. Using a simple seeded randomness extractor, we extend the Aiello-Ishai-Reingold...

متن کامل

A New Protocol for Conditional Disclosure of Secrets and Its Applications

Many protocols that are based on homomorphic encryption are private only if a client submits inputs from a limited range S . Conditional disclosure of secrets (CDS) helps to overcome this restriction. In a CDS protocol for a set S , the client obtains server’s secret if and only if the client’s inputs belong to S and thus the server can guard itself against malformed queries. We extend the exis...

متن کامل

Round-Efficient Oblivious Database Manipulation

Most of the multi-party computation frameworks can be viewed as oblivious databases where data is stored and processed in a secret-shared form. However, data manipulation in such databases can be slow and cumbersome without dedicated protocols for certain database operations. In this paper, we provide efficient protocols for oblivious selection, filtering and shuffle—essential tools in privacy-...

متن کامل

On Security of Sublinear Oblivious Transfer

We study the maximal security attainable by adaptive m-out-of-n oblivious transfer protocols with sublinear communication. It is known how to construct such protocols that are private, but not known how to construct such protocols that are (fully) secure. We define the intermediate notion of coherent oblivious transfer protocols that in particular may have applications in private inference cont...

متن کامل

An Efficient Protocol for Restricted Adaptive Oblivious Transfer

Restricted adaptive oblivious transfer was introduced by Herranz in 2011, which is the main approach to protect user privacy in e-transactions involving operations on digital confidential data or sensitive information. There are many practical applications for restricted adaptive oblivious transfer, such as medical or financial data access, pay-per-view TV, and so on. However, so far as we know...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004