Constant-Round Oblivious Transfer in the Bounded Storage Model

49Citations
Citations of this article
30Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We present a constant round protocol for Oblivious Transfer in Maurer's bounded storage model. In this model, a long random string R. is initially transmitted and each of the parties interacts based on a small portion of R. Even though the portions stored by the honest parties are small, security is guaranteed against any malicious party that remembers almost all of the string R. Previous constructions for Oblivious Transfer in the bounded storage model required polynomially many rounds of interaction. Our protocol has only 5 messages. We also improve other parameters, such as the number of bits transferred and the probability of immaturely aborting the protocol due to failure. Our techniques utilize explicit constructions from the theory of derandomization. In particular, we use constructions of almost t-wise independent permutations, randomness extractors and averaging samplers. © Springer-Verlag 2004.

Cite

CITATION STYLE

APA

Ding, Y. Z., Harnik, D., Rosen, A., & Shaltie, R. (2004). Constant-Round Oblivious Transfer in the Bounded Storage Model. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2951, 446–472. https://doi.org/10.1007/978-3-540-24638-1_25

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free