We consider weak oblivious transfer (OT) from strong one-way functions and the paradigm of transforming unconditionally secure protocols in Maurer's bounded storage model into computational secure protocols in the random oracle model. Weak OT is secure against adversaries which have a quadratic resource gap to honest parties. We prove that the random oracle can be replaced with strong one-way functions in the OT protocol. We construct an OT protocol achieving quadratic security from strong one-way functions. © 2011 Springer-Verlag.
CITATION STYLE
Tanaka, K., Yamada, A., & Yasunaga, K. (2011). Weak oblivious transfer from strong one-way functions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6980 LNCS, pp. 34–51). https://doi.org/10.1007/978-3-642-24316-5_5
Mendeley helps you to discover research relevant for your work.