Skip to main content

Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols

  • Conference paper
  • 626 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5339))

Abstract

This paper studies constructions of \(k \choose 1\) - oblivious transfer protocols in a black-box way. The security of \(k \choose 1\) - oblivious transfer protocols is defined in the real/ideal world simulation paradigm (i.e., the security employs the real/ideal world paradigm for both senders and receivers and thus our construction is fully-simulatable). The idea behind of our constructions is that we first extend the notion of privacy for defensible adversaries in the context of bit-transfer protocols by Ishai, Kushilevitz, Lindell and Petrank at STOC’2006 to the notion of privacy for defensible adversaries in the context of \(k \choose 1\)-oblivious transfer protocols, and then propose black-box constructions of \(k \choose 1\)- oblivious transfer protocols secure against defensible adversaries. Finally, we boost the security of our protocols in order to obtain protocols that are secure against malicious adversaries in the fully-simulatable paradigm. We prove that there exist protocols for secure \(k \choose 1\) - oblivious transfer without an honest majority and in the presence of static malicious adversaries that rely only on black-box access to a homomorphic encryption scheme. By applying the well-known results of Kilian, we further claim that there exist protocols for secure computation without an honest majority and in the presence of static malicious adversaries that rely only on black-box access to a homomorphic encryption scheme.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Choi, S., Dachman-Soled, D., Malkin, T., Wee, H.: Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 427–444. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  2. Gertner, Y., Kannan, S., Malkin, T., Reingold, O., Viswanathan, M.: The relationship between public key encryption and oblivious transfer. In: FOCS 2000, pp. 325–335 (2000)

    Google Scholar 

  3. Gertner, Y., Malkin, T., Reingold, O.: Lower bounds on the efficiency of generic cryptographic constructions. In: Proceedings of the IEEE Symposium on Foundations of Computer Science, pp. 126–135 (2001)

    Google Scholar 

  4. Goldreich, O.: Foundations of Cryptography. Basic Applications, vol. 2. Cambridge University Press, Cambridge (2004)

    Book  MATH  Google Scholar 

  5. Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC, pp. 218–229 (1987)

    Google Scholar 

  6. Haitner, I.: Semi-honest to Malicious Oblivious Transfer - The Black-Box Way. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 412–426. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  7. Horvitz, O., Katz, J.: Bounds on the efficiency of black-box commitment schemes. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 128–139. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  8. Ishai, Y., Kushilevitz, E., Lindell, Y., Petrank, E.: Black-box constructions for secure computation. In: STOC 2006, pp. 99–108 (2006)

    Google Scholar 

  9. Impagliazzo, R., Rudich, S.: Limits on the Provable Consequences of One-Way Permutations. In: STOC 1989, pp. 44–61 (1989)

    Google Scholar 

  10. Kilian, J.: Founding Cryptography on Oblivious Transfer. In: STOC 1988, pp. 20–31 (1988)

    Google Scholar 

  11. Kushilevitz, E., Ostrovsky, R.: Replication is NOT Needed: SINGLE Database, Computationally-Private Information Retrieval. In: FOCS 1997, pp. 364–373 (1997)

    Google Scholar 

  12. Simon, D.R.: Finding Collisions on a One-Way Street: Can Secure Hash Functions Be Based on General Assumptions? In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 334–345. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  13. Yao, A.C.-C.: Protocols for Secure Computations. In: FOCS 1982, pp. 160–164 (1982)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhu, H. (2008). Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds) Cryptology and Network Security. CANS 2008. Lecture Notes in Computer Science, vol 5339. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89641-8_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-89641-8_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-89640-1

  • Online ISBN: 978-3-540-89641-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics