Weak oblivious transfer from strong one-way functions

0Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We consider weak oblivious transfer (OT) from strong one-way functions and the paradigm of transforming unconditionally secure protocols in Maurer's bounded storage model into computational secure protocols in the random oracle model. Weak OT is secure against adversaries which have a quadratic resource gap to honest parties. We prove that the random oracle can be replaced with strong one-way functions in the OT protocol. We construct an OT protocol achieving quadratic security from strong one-way functions. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Tanaka, K., Yamada, A., & Yasunaga, K. (2011). Weak oblivious transfer from strong one-way functions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6980 LNCS, pp. 34–51). https://doi.org/10.1007/978-3-642-24316-5_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free