We show how to break a protocol for Oblivious Transfer presented at Euro-crypt 90 [11]. Armed with a new set of definitions for proving the security of interactive computations, we found difficulties in proving the protocol secure. These difficulties led us to a simple attack that breaks the OT protocol in a subtle but fundamental way. The error that we found may be present in a wide variety of secure protocols. It reveals a fundamental flaw in the traditional definition of Oblivious Transfer itself.
CITATION STYLE
Beaver, D. (1993). How to break a “secure” oblivious transfer protocol. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 658 LNCS, pp. 285–296). Springer Verlag. https://doi.org/10.1007/3-540-47555-9_24
Mendeley helps you to discover research relevant for your work.