Oblivious transfers and privacy amplification

29Citations
Citations of this article
45Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Assume A owns two secret k-bit strings. She is willing to disclose one of them to B, at his choosing, provided he does not learn anything about the other string. Conversely, B does not want A to learn which secret he chose to learn. A protocol for the above task is said to implement One-out-of-two String Oblivious Transfer, denoted (formula presented)-OTk. This primitive is particularly useful in a variety of cryptographic settings. An apparently simpler task corresponds to the case k = 1 of two one-bit secrets: this is known as One-out-of-two Bit Oblivious Transfer, denoted (formula presented)-OT. We address the question of reducing (formula presented)-OTk to (formula presented)-OT. This question is not new: it was introduced in 1986. However, most solutions until now have implicitly or explicitly depended on the notion of self-intersecting codes. It can be proved that this restriction makes it asymptotically impossible to implement (formula presented)-OTk with fewer than about 3.5277k instances of (formula presented)-OT. The current paper introduces the idea of using privacy amplification as underlying technique to reduce (formula presented)-OTk to (formula presented)-OT. This allows for more efficient solutions at the cost of an exponentially small probability of failure: it is sufficient to use slightly more than 2k instances of (formula presented)-OT in order to implement (formula presented)-OTk. Moreover, we show that privacy amplification allows for the efficient implementation of (formula presented)-OTk from generalized versions of (formula presented)-OT that would not have been suitable for the earlier techniques based on self-intersecting codes. An application of this more general reduction is given.

Cite

CITATION STYLE

APA

Brassard, G., & Crépeau, C. (1997). Oblivious transfers and privacy amplification. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1233, pp. 334–347). Springer Verlag. https://doi.org/10.1007/3-540-69053-0_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free