Oblivious Transfers and Privacy Ampliication

نویسنده

  • Gilles Brassard
چکیده

Assume A owns two secret k{bit strings. She is willing to disclose one of them to B, at his choosing, provided he does not learn anything about the other string. Conversely, B does not want A to learn which secret he chose to learn. A protocol for the above task is said to implement One-out-of-two String Oblivious Transfer, denoted (2 1){OT k. This primitive is particularly useful in a variety of cryptographic settings. An apparently simpler task corresponds to the case k = 1 of two one-bit secrets: this is known as One-out-of-two Bit Oblivious Transfer, denoted (2 1){OT. We address the question of reducing (2 1){OT k to (2 1){OT. This question is not new: it was introduced in 1986. However, most solutions until now have implicitly or explicitly depended on the notion of self-intersecting codes. It can be proved that this restriction makes it asymptotically impossible to implement (2 1){OT k with fewer than about 3:5277 k instances of (2 1){OT. The current paper introduces the idea of using privacy ampliication as underlying technique to reduce (2 1){OT k to (2 1){OT. This allows for more eecient solutions at the cost of an exponentially small probability of failure: it is suucient to use slightly more than 2k instances of (2 1){OT in order to implement (2 1){OT k. Moreover, we show that privacy ampliication allows for the eecient implementation of (2 1){OT k from generalized versions of (2 1){OT that would not have been suitable for the earlier techniques based on self-intersecting codes. An application of this more general reduction is given.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Oblivious Transfers and Privacy Ampliication

Assume A owns two secret k{bit strings. She is willing to disclose one of them to B, at his choosing, provided he does not learn anything about the other string. Conversely, B does not want A to learn which secret he chose to learn. A protocol for the above task is said to implement One-out-of-two String Oblivious Transfer, denoted (2 1){OT k 2. This primitive is particularly useful in a variet...

متن کامل

Quantum Oblivious Transfer is Secure Against IndividualMeasurements (

In this paper we show that the BBCS-protocol implementing one of the most important cryptographic primitives oblivious transfer, is secure against any individual measurement allowed by quantum mechanics. We analyze the common situation where successive measurements on the same photon could be used to cheat in the protocol. We model this situation by using a single inner-product-preserving opera...

متن کامل

Privacy Amplification Secure Against Active Adversaries

Privacy ampliication allows two parties Alice and Bob knowing a partially secret string S to extract, by communication over a public channel, a shorter, highly secret string S 0. Bennett, Brassard, Cr epeau, and Maurer showed that the length of S 0 can be almost equal to the conditional R enyi entropy of S given an opponent Eve's knowledge. All previous results on privacy ampliication assumed t...

متن کامل

Privacy Ampliication Secure against Active Adversaries

Privacy ampliication allows two parties Alice and Bob knowing a partially secret string S to extract, by communication over a public channel, a shorter, highly secret string S 0. Bennett, Brassard, Cr epeau, and Maurer showed that the length of S 0 can be almost equal to the conditional R enyi entropy of S given an opponent Eve's knowledge. All previous results on privacy ampliication assumed t...

متن کامل

An Efficient Protocol for Restricted Adaptive Oblivious Transfer

Restricted adaptive oblivious transfer was introduced by Herranz in 2011, which is the main approach to protect user privacy in e-transactions involving operations on digital confidential data or sensitive information. There are many practical applications for restricted adaptive oblivious transfer, such as medical or financial data access, pay-per-view TV, and so on. However, so far as we know...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997