Resource-Efficient OT Combiners with Active Security

نویسندگان

  • Ignacio Cascudo
  • Ivan Damgård
  • Oriol Farràs
  • Samuel Ranellucci
چکیده

An OT-combiner takes n candidate implementations of the oblivious transfer (OT) functionality, some of which may be faulty, and produces a secure instance of oblivious transfer as long as a large enough number of the candidates are secure. We see an OT-combiner as a 2-party protocol that can make several black-box calls to each of the n OT candidates, and we want to protect against an adversary that can corrupt one of the parties and a certain number of the OT candidates, obtaining their inputs and (in the active case) full control of their outputs. In this work we consider perfectly (unconditionally, zero-error) secure OT-combiners and we focus on minimizing the number of calls to the candidate OTs. First, we construct a single-use (one call per OT candidate) OT-combiner which is perfectly secure against active adversaries corrupting one party and a constant fraction of the OT candidates. This extends a previous result by Ishai et al. (ISIT 2014) that proves the same fact for passive adversaries. Second, we consider a more general asymmetric corruption model where an adversary can corrupt different sets of OT candidates depending on whether it is Alice or Bob who is corrupted. We give sufficient and necessary conditions for the existence of an OT combiner with a given number of calls to the candidate OTs in terms of the existence of secret sharing schemes with certain access structures and share-lengths. This allows in some cases to determine the optimal number of calls to the OT candidates which are needed to construct an OT combiner secure against a given adversary.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Robust Combiners for Private Information Retrieval and Other Primitives

Let A and B denote cryptographic primitives. A (k,m)robust A-to-B combiner is a construction, which takes m implementations of primitive A as input, and yields an implementation of primitive B, which is guaranteed to be secure as long as at least k input implementations are secure. The main motivation for such constructions is the tolerance against wrong assumptions on which the security of imp...

متن کامل

Robuster Combiners for Oblivious Transfer

A (k;n)-robust combiner for a primitive F takes as input n candidate implementations of F and constructs an implementation of F , which is secure assuming that at least k of the input candidates are secure. Such constructions provide robustness against insecure implementations and wrong assumptions underlying the candidate schemes. In a recent work Harnik et al. (Eurocrypt 2005) have proposed a...

متن کامل

Single-Use Oblivious Transfer Combiners

An oblivious transfer (OT) protocol allows a receiver to obtain one of two bits held by a sender without revealing its selection. An OT combiner securely implements OT by using oracle access to n OT candidates of which at most t may be insecure. It is known that OT combiners exist when t < n/2. However, known constructions either invoke each candidate multiple times or alternatively require t t...

متن کامل

Single-Use Oblivious Transfer Combiners

An oblivious transfer (OT) protocol allows a receiver to obtain one of two bits held by a sender without revealing its selection. An OT combiner securely implements OT by using oracle access to n OT candidates of which at most t may be insecure. It is known that OT combiners exist when t < n/2. However, known constructions either invoke each candidate multiple times or alternatively require t t...

متن کامل

On Robust Combiners for Oblivious Transfer and Other Primitives

A (1,2)-robust combiner for a cryptographic primitive P is a construction that takes two candidate schemes for P and combines them into one scheme that securely implement P even if one of the candidates fails. Robust combiners are a useful tool for ensuring better security in applied cryptography, and also a handy tool for constructing cryptographic protocols. For example, we discuss using robu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017