How to break a “secure” oblivious transfer protocol

N/ACitations
Citations of this article
36Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We show how to break a protocol for Oblivious Transfer presented at Euro-crypt 90 [11]. Armed with a new set of definitions for proving the security of interactive computations, we found difficulties in proving the protocol secure. These difficulties led us to a simple attack that breaks the OT protocol in a subtle but fundamental way. The error that we found may be present in a wide variety of secure protocols. It reveals a fundamental flaw in the traditional definition of Oblivious Transfer itself.

Cite

CITATION STYLE

APA

Beaver, D. (1993). How to break a “secure” oblivious transfer protocol. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 658 LNCS, pp. 285–296). Springer Verlag. https://doi.org/10.1007/3-540-47555-9_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free